Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

35 total results found

Articles

Red Team

Malware

Threat Intelligence

Notes

Japanese Language Notes

N5

Japanese Language Notes

[Backup] How did I design and build a complex AD set

Notes

Hi Folks, today I would like to share how did I design and build a vulnerable AD set. Before moving to this topic, let me introduce the motivation and some features of this AD set. MOTIVATION I know there are few scripts can automate the process of generatin...

[Backup] Walkthrough of My Vulnerable AD Set

Notes

Hi guys, in previous days I designed and built a difficult and complex vulnerable AD set, I planned to post the guide to reproduce it. However, maybe due to the length, I did not successfully post it on Medium, therefore I posted it on my personal website: htt...

[Backup] Domain Enumeration Methodology

Notes

Hey folks, today I start a new series of articles to discuss Active Directory Exploitation. This is the first article, we focus on domain enumeration. We assume you have already had an initial shell on a domain computer, no matter it is Windows domain computer...

[Backup] Kerberos

Notes

Hey friends, it is the second article in my Active Directory Theory and Exploitation series. Today, I would like to talk about Kerberos. Kerberos might be complex and daunting in many peoples’ opinion, but never mind, hopefully I can make it simple and easy to...

[Backup] Kerberos Delegation

Notes

Hey friends, it is the 3rd article in my Active Directory Theory and Exploitation series. Today, I would like to talk about 3 types of delegation. Kerberos delegation resolved Double Hop problem, however, an attacker can also abuse delegation to gain remote co...

Targeted and Efficien Phishing: Alteryx Workflow

Red Team

Background Recently, my friend who works in the accounting industry has been working hard to learn how to use a tool called Alteryx. She occasionally shares her learning experience with me, even though I do not have any knowledge of the accounting industry. T...

Use Searching Engines to Hunt For Threat Actors

Threat Intelligence

Background Hi folks, today, I’d like to discuss how to leverage search engines to identify vulnerable servers used by threat actors. These actors often employ multiple servers for various purposes, such as phishing infrastructure, command and control (C2) inf...

Bypass AMSI On Windows 11

Red Team

Motivation In this article, I want to break down AMSI (Anti-Malware Scan Interface) and its bypass technique on Windows 11. AMSI bypass is not a new topic, and compared with bypassing EDR, AMSI bypass is much easier, but I found that one bypass approach taugh...

MutationGate

Malware

Background Motivation Considering inline hook is a major detection utilized by EDR products, bypassing them is an interesting topic to me. Regarding bypassing inline hook placed by EDR, there are already quite a few approaches available. Although some of t...

[Backup] OSEP and OSWE Review

Notes

Hello folks, recently I took OSWE exam. For more information about the course, you can check the official website https://www.offensive-security.com/awae-oswe/. Considering that I also passed OSEP (https://www.offensive-security.com/pen300-osep/) half a year a...

[Backup] How Did I Take Over CobaltStrike Servers

Threat Intelligence

Hi folks, today I would like to share how I take over some Cobalt Strike TeamServerswith Quake and Password Spray Attack. From the perspective of a threat hunter, it isgood to track C2 servers on the Internet. From the perspective of a hacker, it is good tocom...

ReflectiveLoading And InflativeLoading

Malware

CobaltStrike's Beacon is essentially a DLL. The raw format payload is a patched DLL file. Through ingenious patching, the Beacon can achieve position independence similar to shellcode. We generate and compare payloads in both DLL and RAW formats: The Beacon i...

Pre Lesson

Japanese Language Notes N5

Lesson 1

Japanese Language Notes N5

语法 1: ~(名词) 是 ~(名词)です ~は~です 李さんは中国人です わたしはおう 2: ~(名词) 不是 ~(名词) ~は~ではありません ~は~じゃありません 森さんは学生ではありません わたしは日本人じゃありません わたしは田中ではありません 3:~(名词)是~(名词)吗? ~は~ですか あなたは小野さんですか。 金さんは中国人ですか。 4:应答 はい,~ いええ,~ いええ,ちがいます はい,学生です。 いええ,ちがいます。 ...

Lesson 2

Japanese Language Notes N5

语法 1: これ/それ/あれは~(名词)です これ:近 それ:距离听话人较近/双方较远 あれ:距离双方都比较远/更远 これは本です それはかばんです あれはテレビです   2: だれですか/何ですか 谁:だれ,どなた (更加礼貌) 什么:何 それは何ですか。 あの人はだれですか。 スミスさんはどなたですか。 3: ~(名词)の~(名词) の 连接名词和名词,表示所属 わたしのかぎ 田中さんの車 4: この/その/あの~(名词)は~(名词)です ...

Lesson 3

Japanese Language Notes N5

语法 1: ここ/そこ/あそこは~(名词)です ここ/そこ/あそこ所表达的位置关系与これ/それ/あれ相同 ここはデパ一トです。 そこは図書館です。 あそこ入口です。 2:~(名词)は~(名词)[场所]です "名词" 存在于"名词"场所 です不仅仅可以表示“是”,还有更为广泛的含义,如"在"。 食堂でば-ト七階です。 トイレはここです。 小野さんは事務所です。 3:~(名词)はどこですか 用于询问存在的场所 トイレはどこですか。 あちらです。 あなたのか...

Lesson 4

Japanese Language Notes N5

语法 1: あります与います あります 表示花,草,桌子等不具有意志的事物 います 表示人,动物,昆虫。 ~(场所)に~(物/人)があります/います 表示存在,相当于 ~ 有 ~ 部屋に机があります。 ここにほんがあります。 庭に何がありますか。 部屋に猫がいます。 公園に子供がいます。 あそこにだれがいます。 ~(物/人)は~(场所)にあります/います 表示位置,相当于 ~ 在 ~ いすは部屋にあります。 本はここにあります。 図書館はどこにありますか。...

Lesson 5

Japanese Language Notes N5

语法 1:  表达 汉字单词短语 中文 读音 日文

Unit 3

Japanese Language Notes N5

Unit 2

Japanese Language Notes N5