1. breaking a Windows login with an empty user profile,
2. getting initial access EZPZ with a Sliver C2 implant,
1. breaking a Windows login with an empty user profile,
2. getting initial access EZPZ with a Sliver C2 implant,
- How did a victim get infected?
- Can we uncover a threat actor when they infect themselves? and more.
Video: youtu.be/3j4jzCU0Kwc
- How did a victim get infected?
- Can we uncover a threat actor when they infect themselves? and more.
Video: youtu.be/3j4jzCU0Kwc
youtu.be/Ap5tIJtt4Tk
youtu.be/Ap5tIJtt4Tk