Lars Iwer @Virtual_Lars Need Hyper-V symbols for debugging/bug hunting? We’ve now published most debugging symbols on our public servers. If you want to know more, this way, please: https://blogs.technet.microsoft.com/virtualization/2018/04/25/hyper-v-symbols-for-debugging/ … #HyperV"Hyper-V symbols for debugging"
“This is the official GitHub Repository of the OWASP Mobile Security Testing Guide (MSTG). The MSTG is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). You can also read the MSTG on Gitbook or download it as an e-book.”"OWASP Mobile Security Testing Guide"
A very detailed post explaining the process they used to “…or why you should ensure all Windows machines are domain joined. The first thing I run on an internal is the Responder tool. This will grab Windows hashes from LLMNR or NetBIOS requests on the local subnet. However, this client was wise to this and had LLMNR & NetBIOS requests disabled. Despite already knowing this fact from the previous engagement, one of the things I learned during…"Gaining Domain Admin from Outside Active Directory"
PowerShell: In-Memory Injection Using CertUtil.exe May 31, 2018, Shane Rudy, Senior Security Consultant, Coalfire Labs Have you ever heard the old saying, “The only constant in life is change?” Nothing is truer in the world of penetration testing and information security than the certainty of change. New defenses are always emerging, and the guys and gals in the red team game are always having to evolve our efforts to evade defenses. This week was one…"PowerShell: In-Memory Injection Using CertUtil.exe"
Windows Server 2016 security auditing for enhanced threat detection “Detecting malicious reconnaissance attempts to access SAM The Security Account Manager (SAM) is a database file, which stores users’ passwords. A common attack is to access SAM remotely to enumerate user groups, such as finding all the users in the local admin group on a server. On Windows Server 2016, when an attacker with insufficient privilege runs a query on the network to identify highly privileged…"Windows Server 2016 security auditing for enhanced threat detection"
Former CIA director says Russians spread misinformation on Jade Helm military exercise “Republican Gov. Greg Abbott was a Russian pawn and a useful idiot for Russian efforts to instill fear and distrust in our American institutions,” deputy executive director Manny Garcia said in a prepared statement. “Gullible Texas Republicans turned against the United States. … Abbott still owes the men and women of our armed forces, and every single Texan, an apology.”"Former CIA director says Russians spread misinformation on Jade Helm military exercise"
Are You Prepared for a Data Disaster? Equities.com Additionally, to prevent data loss and keep the data up to date, it is vital that you keep backing up your data on a consistent basis. This practice has a major role in data recovery if you need to use it in the future. For example, if your Outlook becomes corrupted, you can recover the lost data via backup ."Are You Prepared for a Data Disaster?"
CBA admits losing backup data for 20 million accounts Verdict The Commonwealth Bank of Australia (CBA) has admitted losing bank data and records of almost 20 million customers. The data lost includes names, addresses, account numbers and bank statements. The data was stored on two magnetic tapes which were supposed to be destroyed by sub-contractor …"CBA admits losing backup data for 20 million accounts"