Filter:
-
AD Schema Abuse: Interactive Analysis
Explore a research-grade walkthrough of abusing the Active Directory schema through an interactive, task-focused viewer.
-
AS-REP Roasting: A Technical and Forensic Analysis from a Malware Analyst's Perspective
Comprehensive analysis of AS-REP roasting across protocol mechanics, malware tooling, forensic artifacts, and defensive countermeasures.
-
Prompt Injection: LLM Security Analysis
Prompt Injection: A Paradigm Shift in Cyberattacks Against Large Language Models
-
Analysis of LsaCallAuthenticationPackage
When malware authors want to manipulate Windows authentication, one of their most valuable targets is Kerberos. At the heart of Kerberos interactions inside Windows lies the function LsaCallAuthenticationPackage.