πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Privilege Escalation

Focus Area: 🎯 Penetration Testing
15
Total Entries
17
Contributors

Top Contributors

Nikhil Mittal(2) Anto Joseph(1) Aravindha Hariharan(1) Nitin Kumar(1) Raunak Parmar(1)

All Entries (15 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#exploit-delivery+4
2023-12-06Tool demoBlackhat Docker Exploitation Framework Source Code Rohit Pitke, Emmanuel Law#exploitation#container-security#docker+4
2023-09-28TalkRootcon Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation Video Raunak Parmar#azure#cloud-pentesting#mfa+4
2023-06-01TalkSecurityfest Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud Video Sriraam Natarajan, Venkatraman Kumar#red-teaming#azure#active-directory+2
2023-05-12TalkBlackhat Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators Video Sravan Akkaram, Nestori Syynimaa#azure#identity-governance#access-management+1
2022-12-08TalkBlackhat Exploring a New Class of Kernel Exploit Primitive Presentation Rohit Mothe, Andrew Ruddick#kernel#exploit-delivery#privilege-escalation
2022-09-07TalkNullcon Hacking Android Foreground Services Escalation Of Privileges Presentation Video Rony Das#android#android-security#mobile-hacking+3
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittal#red-teaming#ci-cd#cicd-security+3
2015-11-05TalkGroundzerosummit Dissecting Android Malware Anto Joseph#android#application-pentesting#dynamic-analysis+3
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittal#security-assessment#red-teaming#exploitation+3
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2007-04-04TalkHitbsecconf Vboot Kit: Compromising Windows Vista Security Presentation Vipin Kumar, Nitin Kumar#windows#boot-sector#endpoint-protection+1
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shah#firewall#red-teaming#sql-injection+2