The security expert Dirk-jan Mollema discovered a privilege escalation vulnerability in Microsoft Exchange that could be exploited by a user to become a Domain Admin.
Second step of my “social media detox”: today we destroy the Instagram account!
How DNS tunneling can be used for data exfiltration? And how can be detected? DNS Tunneling is a technique that encodes data of other programs or protocols in DNS queries, including data payloads that can be added to an attacked DNS server and used to control a remote server and applications. DNS tunneling was originally…
Right after new year’s, I’ve decided to start a process of “social media detox”: one of my 2019 goals is to find more time left to read, study and watch movies.
…and are available to download.