Skip to the content

Hacktive Security Blog

  • Pin Posts
0
8
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)
Active Directory

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)

calfcrusher
November 15, 2023November 15, 2023
DISCLAIMER - This article is provided for educational and informational purposes only. The techniques, tools, and examples discussed are intended to promote a better understanding...
Read More
0
3
Security VS Corporate Management
GRC

Security VS Corporate Management

Angelo Chiarot
September 13, 2023September 13, 2023
The devil and holy water  THE SITUATION  Having had the opportunity to observe a few hundred companies over the past 30 years, to date there...
Read More
0
12
Unveiling the Hidden Threat: Dissecting a Malware on PyPI repository (Part 1)
Active Directory

Unveiling the Hidden Threat: Dissecting a Malware on PyPI repository (Part 1)

calfcrusher
August 2, 2023November 15, 2023
In the vast realm of software development, the Python Package Index has long been a trusted repository for Python packages. However, even the most reliable...
Read More
0
4
๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Matteo Lucchetti โ€“ Penetration Tester/Red Teamer
Meet The Team

๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Matteo Lucchetti โ€“ Penetration Tester/Red Teamer

Matteo Lucchetti
June 20, 2023June 20, 2023
I miei primi approcci nel campo dell'informatica risalgono circa alla fine degli anni '90. Avevo poco piรน di cinque anni quando ho iniziato a mettere...
Read More
0
21
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
Red Teaming

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)

calfcrusher
June 5, 2023June 6, 2023
DISCLAIMER - This article is provided for educational and informational purposes only. The techniques, tools, and examples discussed are intended to promote a better understanding...
Read More
0
0
๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Enrico Ingenito – Sales Manager
Meet The Team

๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Enrico Ingenito – Sales Manager

o___o
April 19, 2023April 20, 2023
Il mio percorso professionale รจ iniziato nel mondo delle TLC nel 1983, tra le braccia della Mamma dei Fili nazionale: da lรฌ in poi ho...
Read More
0
3
Hacking the Dutch government
Uncategorized

Hacking the Dutch government

Michele Mariani
April 5, 2023April 20, 2023
A few months ago I found out that the dutch government is hosting a bug-bounty program that covers a lot of assets from their infrastructures....
Read More
0
8
CVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF
Exploitation

CVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF

Alessandro Groppo
December 21, 2022December 27, 2022
Introduction In the past few weeks, I worked with @LukeGix (checkout his blog post on the same vulnerability here) to exploit the CVE-2022-2602, a very...
Read More
0
2
Lock Picking – Part 1
Uncategorized

Lock Picking – Part 1

Arcangelo Saracino
November 7, 2022
https://youtu.be/ArM0_64pL8I
Read More
0
15
How an Akamai misconfiguration earned us USD 46.000
Uncategorized

How an Akamai misconfiguration earned us USD 46.000

Francesco Mariani
September 17, 2022September 19, 2022
A few months ago me and my friend Jacopo Tediosi made an interesting discovery about an Akamai misconfiguration that allowed us to earn more than...
Read More

Recent Post

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)

Security VS Corporate Management

Unveiling the Hidden Threat: Dissecting a Malware on PyPI repository (Part 1)

๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Matteo Lucchetti โ€“ Penetration Tester/Red Teamer

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)

Top Category

Application Security

Mobile

Exploitation

  • Pin Posts
Copyright © 2023 Hacktive Security Blog. All rights reserved.
Theme: Masonry Grid By Themeinwp. Powered by WordPress.
To the Top ↑ Up ↑