❌

Reading view

There are new articles available, click to refresh the page.

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

moth // IntroductionΒ  One fateful night in June of 2022, Ethan sent a message to the crew: β€œAnyone know ways to foolΒ AuditdΒ on Linux?Β I’mΒ trying to figure out how to change theΒ auidΒ (audit […]

The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t appeared first on Black Hills Information Security, Inc..

Avoiding Memory Scanners

Kyle Avery // Introduction This post compliments a presentation I gave at DEF CON 30 – β€œAvoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More,” which included the […]

The post Avoiding Memory Scanners appeared first on Black Hills Information Security, Inc..

Click to Enable Content

Sally Vandeven // Evading anti-virus scanners has become a bit of a sport around BHIS. Β When we do C2 testing for our customers we start with a host on the […]

The post Click to Enable Content appeared first on Black Hills Information Security, Inc..

Modifying Metasploit x64 template for AV evasion

Joff Thyer // Β  When performing a penetration of test of organizations with Windows desktops, many testers will now resort to using tools like Veil’s Powershell Empire in order to […]

The post Modifying Metasploit x64 template for AV evasion appeared first on Black Hills Information Security, Inc..

❌