ttp


Abusing Application Layer Gateways (NAT Slipstreaming)
Machine Learning Attack Series: Repudiation Threat and Auditing
Leveraging the Blue Team's Endpoint Agent as C2
Machine Learning Attack Series: Stealing a model file
Coming up: Grayhat Red Team Village talk about hacking a machine learning system
Beware of the Shadowbunny - Using virtual machines to persist and evade detections
Beware of the Shadowbunny! at BSides Singapore
Red Teaming Telemetry Systems
Firefox - Debugger Client for Cookie Access
Remotely debugging Firefox instances
Performing port-proxying and port-forwarding on Windows
Using built-in OS indexing features for credential hunting
Shadowbunny article published in the PenTest Magazine
$3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
Cookie Crimes and the new Microsoft Edge Browser
Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
Hunting for credentials and building a credential type reference catalog
2600 - The Hacker Quarterly - Pass the Cookie Article
MITRE ATT&CK Update for Cloud and cookies!
McPivot and useful LLDB commands
Pass the Cookie and Pivot to the Clouds