Coustom Bash – A Tool To Automate Penetration Testing Tasks

Custom bash scripts have emerged as powerful tools for automating a range of penetration testing tasks, from reconnaissance to payload creation. Tailored specifically for use with Kali Linux, these scripts streamline activities like scanning, enumeration, and the generation of malicious payloads using Metasploit. This article delves into the intricacies of setting up and leveraging such […]

September 7, 2023
Read More >>

Chinese cyberspies obtained Microsoft signing key from Windows crash dump due to a mistake

Microsoft revealed that the Chinese group Storm-0558 stole a signing key used to breach government email accounts from a Windows crash dump. In July, Microsoft announced it had mitigated an attack conducted by a China-linked threat actor, tracked as Storm-0558, which targeted customer emails. Storm-0558 threat actors focus on government agencies in Western Europe and […]

The post Chinese cyberspies obtained Microsoft signing key from Windows crash dump due to a mistake appeared first on Security Affairs.

September 7, 2023
Read More >>