Readers of ZSEC and my Twitter feed, A quick message/explanation. I have published my last two blog posts for a while as I am working on my second book; LTR102 [https://leanpub.
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
Exploiting Petit Potam in a different way to force some downgrade and protocol attacks.
I have made it somewhat of a tradition to look back at the previous 12 months in a blog post on the last day of the year or last week of the year.
One thing that comes up a lot when it comes to red teaming, penetration testing and breaching a network is being able to proxy traffic into multiple environments.