- ITSEC Newsletter
- Posts
- ITSEC Newsletter 2023-05-25
ITSEC Newsletter 2023-05-25
Red team is best team
“The goal of this article is to rewrite a direct syscall dropper into an indirect syscall dropper, analyse both droppers with x64dbg, and understand the difference between direct syscalls and indirect syscalls. Also, at the end of the article, I will talk a bit about the limitations of Indirect Syscalls in the context of EDR evasion.”
"Analyze the balance between gaining useful information and avoiding detection, detailing recon techniques that can be employed without compromising stealth."
"In cybersecurity, techniques evolve rapidly as defenders and attackers adapt to the ever-changing landscape. This article will explore an exemplary example of this evolution in transitioning from Domain Fronting to Platform as a Service (PaaS) Redirectors."
"In this article, you will learn how to add a backdoor to the SSH Public Key. The backdoor will execute whenever the user logs in. The backdoor hides as an unreadable long hex-string inside ~/.ssh/authorized_keys or ~/.ssh/id_*.pub."