all InfoSec news
Hacking With Your Nemesis
Security Boulevard securityboulevard.com
In the first post in this series, On (Structured) Data, we talked about the gap area of offensive structured data and ended with the question, “If all of our offensive tools produced and worked with structured data, what would be possible?” The second post, Challenges In Post-Exploitation Workflows, covered several challenges we’ve encountered in past engagements such as file store mining, privilege escalation, and data protection application programming interface (DPAPI) abuse. This post will cover our solution …
area challenges data data analysis data security exploitation gap hacking offensive offensive security post-exploitation question series structured data tools workflows