Practical Browser Post-Exploitation Using SSLKEYLOGFILE
Using the built-in session secret logging functionality of TLS libraries to steal cookies from browsers.
Using the built-in session secret logging functionality of TLS libraries to steal cookies from browsers.
Windows allows any user to setup a VPN connection, can we use this functionality for offensive purposes?
An exploration of the .search-ms file format and search protocol handlers in combination with WebDAV payloads.