Blog Phishing System Profiles without Phone Calls What type of reconnaissance do you do before a phishing attack? Recently, I was having dinner with new friends and inevitably, our conversation became a
Blog Scripting Beacons and Deploying Persistence One common Cobalt Strike feature request is an API to script the Beacon payload. Doing this right is a big project and it requires some
Blog Scripting Matt Nelson’s MMC20.Application Lateral Movement Technique This is a short blog post with a long title. A few weeks ago, Matt Nelson published Lateral Movement Using the MMC20.APPLICATION COM Object (there’s