Posts related to red teaming.

Data Execution Policy (DEP) Bypass Using Return Oriented Programming (ROP) Chains

DATA EXECUTION POLICY BYPASS USING RETURN ORIENTED PROGRAMMING CHAINS This blog post was written by Dharmik Karania. Data Execution Prevention (DEP) was introduced as a security mechanism in Windows Machines to make parts of memory non-executable, due to which attacks that attempt to execute instructions on the stack [...]

By |2021-05-03T15:45:09+03:00November 10th, 2020|Offensive Security, Penetration Testing, Red Teaming|

Attacking WPA/WPA2 Wi-Fi and spreading a payload on the compromised network

ATTACKING WPA/WPA2 Wi-Fi & SPREADING A PAYLOAD ON THE COMPROMISED NETWORK This blog post was written by Alex Maina. Intro Before attacking wifi networks we need to understand how they work. What is Wi-Fi? WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which [...]

By |2021-01-21T11:16:00+03:00November 3rd, 2020|Offensive Security, Penetration Testing, Red Teaming|

Creating a Fully Undetectable (FUD) Backdoor

CREATING A FULLY UNDETECTABLE (FUD) BACKDOOR This blog post was written by Varun Gupta and Amarjit Labhuram. At the beginning of September one of our cohort members, Varun Gupta, asked a very interesting question: How can I create a metasploit payload that can bypass Windows Defender on a [...]

By |2021-05-24T15:58:22+03:00September 20th, 2020|Offensive Security, Penetration Testing, Red Teaming|
Go to Top