I define threat replication as a penetration test that looks like an attack from an APT actor. Assessments that involve threat replication are more than
Mimikatz is a rapidly evolving post-exploitation toolkit by Benjamin Delpy. I call it a post-exploitation toolkit because it has a lot of features, far beyond
High latency communication allows you to conduct operations on your target’s network, without detection, for a long time. An example of high-latency communication is a
Information Security is a strange field. There are probably few professions with such a wide range of social skills and preferences as the information security
Meterpreter’s getsystem command is taken for granted. Type getsystem and magically Meterpreter elevates you from a local administrator to the SYSTEM user. What’s really happening
Listeners are Cobalt Strike’s abstraction in front of the Metasploit Framework’s payload handlers. A handler is the exploit/multi/handler module. This module sets up a server that
UAC is User Account Control. Introduced in Windows Vista, UAC is a collection of technologies that make it convenient possible to use Windows without administrator