Signed, Trusted, and Abused: Proxy Execution via WebView2
An offensive security perspective on Microsoft Edge WebView2 Runtime, including architectural weaknesses, existing vulnerabilities, and exploitation methods.
An offensive security perspective on Microsoft Edge WebView2 Runtime, including architectural weaknesses, existing vulnerabilities, and exploitation methods.
Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots.
Detection Tools: Real Intelligence Threat Analytics (RITA), Security Onion, AC-Hunter Community Edition, Passer, espy Real Intelligence Threat Analytics (RITA): https://www.activecountermeasures.com/free-tools/rita – Open-source network traffic analysis tool. Security Onion: https://securityonionsolutions.com – […]
Joseph Lillo rejoined Black Hills Information Security (BHIS) in 2025 as Head of Engineering, after previously working with BHIS from 2015 to 2019, where he contributed to the development of […]
This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]
Answered by Chris Brenton of Active Countermeasures | Questions compiled from the infosec community by Shelby Perry This article was originally published in the Threat Hunting issue of our infosec […]
Here we go again, discussing Active Directory, hacking, and detection engineering. tl;dr: One AD account can provide you with three detections that if implemented properly will catch common adversarial activities […]
In this video, experts delve into the intricacies of desktop application penetration testing methodologies.