ITSEC Newsletter 2023-07-20

Red team is best team

“The aim of this article is to provide an insight in the most hidden secrets of the hacker world and the inner workings of their most holy tools, or maybe it is just an article how to read and parse LSASS memory dumps.“

“In this guide, we’re about to embark on an epic adventure – from understanding the basics of reverse engineering to mastering the advanced techniques, and even applying these in real-world scenarios. But don’t worry, we’ll walk you through each step of this roadmap, ensuring you understand the concepts, practices, and even the ethical implications involved in reverse engineering.“

“In this post, we will discuss, in a general overview, some concepts that will help us understand how Windows handles access relationships and privileges between objects and how to enumerate these relationships.“