-
i break software - My work with different software, bug hunting and interesting tidbits
i break software - My work with different software, bug hunting and interesting tidbits
A blog post about some post exploitation scenarios with MySQL, MSSQL, PostgreSQL and Oracle that use SQL Injecti...
-
Windows
A blogpost that shows a practical approach to setting up malware to run on Windows using the Linux subsystem and wine to avoid detection.
-
Productivity
A quick blog post to show how I move files between a remote desktop connected machine and my local linux host via a Windows virtual machine and a SOCKS proxy.
-
Sql Injection
A blog post about some post exploitation scenarios with MySQL, MSSQL, PostgreSQL and Oracle that use SQL Injection to make network requests resulting in Server Side Request Forgery/Cross Site Port Att...
-
Psexec
February 20, 2016
in
psexec
Enabling the abililty to use psexec over the network when credentials are available by toggling a value in the Windows registry.
-
Cloud
Slides of my talk on using mis-configurations, overtly permissive IAM policies and application security vulnerabilities to get shells in AWS EC2 instances and go beyond the plane of attack. Presented ...