Remote Desktop Protocol vulnerabilities exploitation
Introduction One of the most popular communication protocols for remotely controlling systems is the Remote Desktop Protocol (RDP).
Introduction One of the most popular communication protocols for remotely controlling systems is the Remote Desktop Protocol (RDP).
Introduction Netsh, in its full name Network Shell, is a command-line tool, for listing and configuring various network settings.
Introduction IPv6 is an Internet Protocol version 6, that was made to replace IPv4. Like IPv4, it is intended for routing data over the Internet.
The fact that cars are a target to hackers is not surprising. Discovering a vulnerability in a car brings fame to ethical hackers, while unethical hackers can sell their finding to automotive gangs.
IPv6 address consists of 3 parts: Global Routing Prefix, Subnet ID and Interface ID. Interface ID identifies an interface of particular node and is unique within the subnet.
Introduction Windows 10 Timeline is a relatively new forensic artefact, which was introduced in Windows 10 version 1803.
Since Microsoft published a new RCE vulnerability in Microsoft Windows Media Foundation discovered by us, we would also like to share full list of vulnerabilities we have discovered.
Standard remote shells like SSH require that the target machine needs to be visible over the network.
In the second part of our overview we continue with the selection of the most used and most usable malware analysis tools.