SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label data exfiltration. Show all posts
Showing posts with label data exfiltration. Show all posts

Anatomi of a Microsoft Verified Publisher Abuse: A Threat Intelligence Brief

›
The digital shadows are where true threats lurk, not in the flashing lights of a compromised server, but in the silent exploit of trusted...

Anatomy of a Printer-Based Display: Exploiting Legacy Hardware for Information Leakage

›
The digital realm whispers with forgotten hardware, relics of a past era often overlooked in the relentless march of progress. These devic...

Anatomy of CTF Challenges: A Deep Dive into SANS Holiday & Insomni'hack 2022

›
The digital realm is a battlefield, and Capture The Flag (CTF) events are the training grounds. These aren't just games; they are meti...

Chrome Extensions: Stealthy Data Exfiltration to Amazon, Not You

›
The digital underworld is a labyrinth of forgotten vulnerabilities and clever social engineering. In this grim cityscape, even the tools w...

Anatomy of PHP Data Exfiltration: Exploiting Filename Leaks for Defense

›
The digital shadows whisper secrets, and sometimes, those secrets are written in plain text, tangled in the syntax of poorly configured PH...

Mastering Data Exfiltration: A Defensive Blueprint for CanaryTokens and USB Exploits

›
The digital shadows lengthen, and the hum of the server room is a lullaby whispered to the complacent. In this realm of whispers and code,...
›
Home
View web version
Powered by Blogger.