Tag: post-exploitation
-
Hacker News: How to gain code execution on hundreds of millions of people and popular apps
Source URL: https://kibty.town/blog/todesktop/ Source: Hacker News Title: How to gain code execution on hundreds of millions of people and popular apps Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details a security vulnerability discovered in the “todesk” application bundler, highlighting a significant exploit that allows arbitrary code execution in various applications relying…
-
The Register: Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town
Source URL: https://www.theregister.com/2024/09/23/splinter_red_team_tool/ Source: The Register Title: Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town Feedly Summary: No malware crew linked to this latest red-teaming tool yet Attackers are using Splinter, a new post-exploitation tool, to wreak havoc in victims’ IT environments after initial infiltration, utilizing capabilities such as executing Windows commands,…