Reading time:
~10 min
Posted
by Reino Mostert
on
02 September 2024
TL;DR: I found a cool way to get rid of pre-conditions in NOSQL syntax injections I have been investigating NoSQL...
Reading time:
~8 min
Posted
by Leon Jacobs
on
08 July 2024
Everyday we’re faced with a choice – some glaringly obvious, others more subtle. The choice to give, or to take,...
Reading time:
~16 min
Posted
by aurelien.chalot@orangecyberdefense.com
on
03 July 2024
While doing an internal assessment, I was able to compromise multiple computers and servers but wasn’t able to dump the...
Reading time:
~23 min
Posted
by guilhem.rioux@orangecyberdefense.com
on
20 June 2024
Introduction GLPI is a popular software used by companies, mainly in France. GLPI is usually used for two main purposes....
Reading time:
~20 min
Posted
by claire.vacherot@orangecyberdefense.com
on
30 May 2024
Inside industrial systems (also known as Operational Technology, or OT), devices communicate with each other and can be accessed over...
Reading time:
~9 min
Posted
by aurelien.chalot@orangecyberdefense.com
on
18 April 2024
If you have been doing internal assessments on Active Directory infrastructure you may have heard the following words: “Null session”,...
Reading time:
~11 min
Posted
by Paul van der Haas
on
22 March 2024
TL&DR – While on an assessment, I found an instance of ReCrystallize Server. It had many problems, some of which...
Reading time:
~15 min
Posted
by Felipe Molina
on
26 February 2024
Context In the chilly month of December 2023, my colleagues Jason (@BreakerOfSigns), Szymon (@TH3_GOAT_FARM3R), and myself (@felmoltor) were on a...
Reading time:
~9 min
Posted
by Jason Spencer
on
19 February 2024
I created a small crypto style CTF for Black Hat last year (we’re training again this year, check our courses...
Reading time:
~20 min
Posted
by Rogan Dawes
on
06 February 2024
Sometimes you need to get in the way of a hardware device and its controller, and see what it has...
Reading time:
~54 min
Posted
by aurelien.chalot@orangecyberdefense.com
on
31 January 2024
Categories:
Callbacks,
Driver,
Edr,
Hooking,
Kernel,
Rootkit,
Shellcodes,
Ssdt,
Winapi,
Windows,
Rootkits,
Shellcode
TL;DR I wanted to better understand EDR’s so I built a dummy EDR and talk about it here. EDR (Endpoint...