This post will walk through various services within the Azure catalogue and look at potential attack paths.
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
Exploiting Petit Potam in a different way to force some downgrade and protocol attacks.
Readers of ZSEC and my Twitter feed,
A quick message/explanation. I have published my last two blog posts for a while
as I am working on my second book;
I have made it somewhat of a tradition to look back at the previous 12 months in
a blog post on the last day of the year or last week of the year.