Posts related to our team research on various defensive security works available from multitude of resources.

Abusing CVE-2022-26923 through SOCKS5 on a Mythic C2 agent

ABUSING CVE-2022-26923 THROUGH SOCKS5 ON A MYTHIC C2 AGENT This blog post was written by Amarjit Labhuram CVE-2022-29623 Vulnerability Introduction Vulnerability Type: Elevation of Privilege Vulnerability Component: Active Directory Certificate Services (AD CS) An attacker/user that has the ability to create a machine account and tamper with [...]

The Auror Project – Challenge 1 [Setting the lab up automatically]

THE AUROR PROJECT - CHALLENGE 1 [SETTING THE LAB UP AUTOMATICALLY] This blog post was written by Amarjit Labhuram Introduction In The Auror Project launched a course called the 3 machines lab - Active Directory series and if you know me by know you know I am [...]

Using Elastalert to alert via email when Mimikatz is run.

USING ELASTALERT TO ALERT VIA EMAIL WHEN MIMIKATZ IS RUN. This blog post was written by Dharmik Karania Introduction In this blog, I shall discuss how an alert can be sent via email when Mimikatz is run. Mimikatz is a post-exploitation tool that is used to dump [...]

Go to Top