| | User Account Control – What Penetration Testers Should Know (strategiccyber.com) |
|
2 points by raffi on March 20, 2014 | past
|
| | Man-in-the-Browser Session Stealing (strategiccyber.com) |
|
2 points by raffi on Dec 23, 2013 | past
|
| | Stealthy Peer-to-peer C&C over SMB pipes (strategiccyber.com) |
|
1 point by conductor on Dec 8, 2013 | past
|
| | I was most productive--when I was unemployed (strategiccyber.com) |
|
1 point by raffi on Oct 24, 2013 | past | 2 comments
|
| | The ACE Problem Solving Method (I use this) (strategiccyber.com) |
|
1 point by raffi on Oct 10, 2013 | past
|
| | Email Delivery - What Penetration Testers Should Know (strategiccyber.com) |
|
3 points by raffi on Oct 3, 2013 | past
|
| | Browser Pivoting (A way to get past two-factor auth) (strategiccyber.com) |
|
1 point by raffi on Sept 26, 2013 | past
|
| | How to crack my software and add a back door (strategiccyber.com) |
|
177 points by raffi on Sept 6, 2013 | past | 55 comments
|
| | How to Inject Shellcode from Java (strategiccyber.com) |
|
1 point by raffi on Aug 29, 2013 | past
|
| | Phishing System Profiles without Phone Calls (strategiccyber.com) |
|
1 point by raffi on Aug 15, 2013 | past
|
| | Why is notepad.exe connecting to the internet? (strategiccyber.com) |
|
4 points by raffi on Aug 8, 2013 | past
|
| | Hacking through a Straw (Pivoting over DNS) (strategiccyber.com) |
|
1 point by raffi on July 9, 2013 | past
|
| | Staged Payloads - What Pen Testers Should Know (strategiccyber.com) |
|
3 points by raffi on June 28, 2013 | past
|
| | That'll never work--we don't allow port 53 out (strategiccyber.com) |
|
2 points by raffi on June 20, 2013 | past
|
| | DNS Command and Control Added to Cobalt Strike (strategiccyber.com) |
|
1 point by raffi on June 6, 2013 | past
|
| | Goading Around Firewalls (strategiccyber.com) |
|
1 point by raffi on May 22, 2013 | past
|
| | Western Regional CCDC - A Red Team Perspective (strategiccyber.com) |
|
1 point by raffi on April 2, 2013 | past
|
| | A Vision for Distributed Red Team Operations (strategiccyber.com) |
|
1 point by raffi on Feb 12, 2013 | past
|
| | Getting Started with Armitage and the Metasploit Framework (2013) (strategiccyber.com) |
|
1 point by raffi on Feb 6, 2013 | past | 1 comment
|
| | Tactics to Hack an Enterprise Network (strategiccyber.com) |
|
3 points by raffi on Jan 14, 2013 | past | 1 comment
|
| | How to Milk a Computer Science Education for Offensive Security Skills (strategiccyber.com) |
|
7 points by raffi on Dec 26, 2012 | past
|
| | Offense in Depth (strategiccyber.com) |
|
2 points by raffi on Dec 6, 2012 | past
|
| | Go Down the Stack Young Man – Story of a (Network Performance) Bug (strategiccyber.com) |
|
7 points by raffi on Aug 8, 2012 | past
|
| | I lost my voice before speaking to 1,000 people at DEFCON (strategiccyber.com) |
|
2 points by raffi on July 29, 2012 | past | 1 comment
|