Virtual magic. Emulation and virtualization technologies in pivoting

Date: 28/02/2025

When you conduct pentesting audits, you rarely enjoy such luxury as admin privileges or root rights. Quite the opposite, in most situations you have to deal with antiviruses and firewalls that make it almost impossible to deliver an attack. Fortunately, emulation and virtualization magic comes to help, and, using these technologies, you can literally accomplish wonders!
Read full article →

Blinding Sysmon: How to disable Windows monitoring in a covert way

Date: 27/02/2025

Immediately after getting access to the target system, the attacker tries to blind its audit tools to remain undetected as long as possible. In this article, I will explain how to blind Sysmon in a covert way making it possible to fool the regular Windows audit. The technique is pretty simple and involves manipulations with handles and security descriptors.
Read full article →

ADS-B guide

Date: 24/02/2025

Wherever you are, aircraft frequently pass overhead; sometimes several ones in a few minutes. Services like Flightradar24 provide precise real-time information about these flights using data received over the ADS-B protocol. You can also receive and decode such data; just follow instructions provided in this guide!
Read full article →