Baycode News - blog articles, news

Navigating the Digital Realm

  1. Home
  2. Search
  3. All articles
  4. Visit _baycode.eu
  5. Dark Mode

Archives

2024 3
2023 3
2021 1
2018 1

Categories

Hacking Conferences Hello Security Linux Windows Active Directory Domain Compromise Series Exploits Malware Development Web Hacking Artificial Intelligence Cryptography Security Awareness Steganography

Tags

Injection WGUiSW Credentials Reuse Persistence Antivirus Evasion AS-REP Roasting Authentication Command Injection Cookies Cryptography Data Loss Prevention Evasion Deep Fakes Deep Learning Delegation Developers Enumeration External Pentest Face Swapping GAN Golden Ticket IMAP Insider Threats Internal Pentest Kerberoasting Kerberos Kernel Lateral Movement LLM LSASS Man in the Middle Password Cracking Pivoting Poisoning Print Nightmare Prototype Pollution RDP Reports Security Awareness SMB Relay Steganography Terminal TIOCSTI Voice Cloning WinRM XSS
Featured image of post 0x08 - Stay safe, realistically
Hello Security Security Awareness Conferences

0x08 - Stay safe, realistically

Final part three of the Hello Security series dedicated to extend cyber-security awareness, performed at WGUiSW conference.

Krystian Bajno
Mar 04, 2024
2 minute read
Featured image of post 0x07 - About Insider Threats. Crypto, Stego, DLP
Hello Security Cryptography Steganography Conferences

0x07 - About Insider Threats. Crypto, Stego, DLP

Part two of the Hello Security series dedicated to extend cyber-security awareness, performed at WGUiSW conference.

Krystian Bajno
Feb 06, 2024
2 minute read
Featured image of post 0x06 - Say Hello To Security - AI & Voice Cloning
Hello Security Artificial Intelligence Conferences

0x06 - Say Hello To Security - AI & Voice Cloning

Part one of the Hello Security series dedicated to extend cyber-security awareness, performed at WGUiSW conference.

Krystian Bajno
Jan 09, 2024
2 minute read
Featured image of post 0x05 - TIOCSTI injection
Linux Hacking

0x05 - TIOCSTI injection

Abusing TIOCSTI to manipulate process file descriptors and execute arbitrary commands.

Krystian Bajno
Dec 30, 2023
2 minute read
Featured image of post 0x04 Lateral Movement
Domain Compromise Series Active Directory Windows Malware Development Hacking

0x04 Lateral Movement

Exploiting the Active Directory environment and compromising the domain controller.

Krystian Bajno
Nov 02, 2023
61 minute read
Featured image of post 0x03 Prototype Pollution
Domain Compromise Series Web Hacking Linux Windows Active Directory Hacking Exploits

0x03 Prototype Pollution

Finding a way into the internal infrastructure. Prototype pollution, popping shells, for fun, and for profit.

Krystian Bajno
Oct 13, 2023
24 minute read
Featured image of post 0x02 Terminal Injection
Linux Windows Exploits Hacking Malware Development

0x02 Terminal Injection

What happens when you run scripts without checking the contents properly?

Krystian Bajno
Jun 07, 2021
2 minute read
Featured image of post 0x01 Web Hacking - Cookies Interception 101
Web Hacking Hacking

0x01 Web Hacking - Cookies Interception 101

This article will explain some of the common HTTP state interception methods.

Krystian Bajno
Apr 21, 2018
8 minute read
© 2024 Baycode News - blog articles, news