Photo by Christina @ wocintechchat.com on Unsplash

HEVD: Local Privilege Escalation

Local Privilege Escalation


In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD



Photo by Michael Dziedzic on Unsplash

HEVD: kASLR + SMEP Bypass

Bypassing OS protections


In this article we will defeat some protections using several techniques for exploting HackSys...



Photo by Chaozzy Lin on Unsplash

HEVD: Denial of Service

How to crash Windows


This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...



Photo by Wesley Caribe on Unsplash

Windows Kernel Exploitation: Lab

Getting in the deeps of the OS


This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers



Photo by Gary Bendig on Unsplash

A New Red Team Expert

A short interview with Daniel Yepes


We talked to Daniel Yepes, a colleague who recently achieved his certificate as a Red Team...



Red wooden mailbox near green leaf plan. Photo by Bundo Kim on Unsplash.

Respond the Name

Attacking a network using Responder


Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do...



Toasting Marshmallow. Photo by hcmorr on Unsplash: https://unsplash.com/photos/qlHRuDvaxL8

Roasting Kerberos

Attacking a DC using kerberoast


Windows Active Directory works using the Kerberos protocol, and in this blog post, we detail how...



New York City Skyline

Querier Writeup

How to solve HTB Querier


Here we explain how to use Querier's insecure configurations to gain system access, and how to...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy