PinnedPath to Process Injection — Bypass Userland API HookingIntroductionNov 27, 2020A response icon2Nov 27, 2020A response icon2
The Real Skillset for OT Red TeamingIf you’re truly committed to building a career in OT penetration testing or OT red teaming, particularly in a consulting role — understand…Jun 7Jun 7
What if an attacker gains access to Piping & Instrumentation Diagram (P&ID)?If an attacker gains access to a Piping & Instrumentation Diagram (P&ID), they can leverage it to plan a targeted attack on the industrial…Jan 24A response icon1Jan 24A response icon1
What happens if an attacker gains access to a Human-Machine Interface (HMI)?Can attackers cause widespread disruption simply by changing process variables? The answer isn’t as straightforward as one might think.Jan 11Jan 11
How Attackers Target OT: From Process Understanding to SCIL ScriptsDisclaimer: The opinions stated here are my own, not the views of my employer.Feb 5, 2024Feb 5, 2024
Understanding and Abusing Access Tokens — Part IINow, considering the knowledge gained earlier in Part I, let’s understand SeImpersonatePrivilege which the administrator account has by…May 31, 2020A response icon1May 31, 2020A response icon1
Understanding and Abusing Process Tokens — Part IIntroductionMay 31, 2020A response icon1May 31, 2020A response icon1