Top Categories

Spotlight

todayMay 7, 2024

Cyber Security Hubbl3

Survivorship Bias and How Red Teams Can Handle It

Reporting is, by nature, only the threat actors that have been caught. What about all the ones that didn’t get caught? There is no way to examine that and It comes down to the fact that we don’t know what they did and therein lies the problem for threat emulation.


Hubbl3

8 Results / Page 1 of 1

Background

todayJune 16, 2022

  • 1274
  • 1
close

Cyber Security Hubbl3

Maldocs Are Evolving

Unless you have been living under an infosec rock the past couple of weeks, you probably heard about the Follina exploit, which allows attackers to achieve remote code execution via ms-msdt. We will get to some more specifics about exactly how Follina works in a minute, but I want to ...

todayJuly 14, 2021

  • 6943
  • 6
close

Cyber Security Hubbl3

XLS Entanglement

VBA tradecraft is constantly evolving and this past winter, I came across some articles from Adepts of 0xCC. Specifically, their article Hacking in an Epistolary Way: Implementing Kerberoast in Pure VBA caught my attention and I wanted to try and see if it would be possible to create a pure ...

email, email marketing, newsletter

todayJune 16, 2020

  • 1896
  • 3
close

Cyber Security + Offensive Security Tools Hubbl3

Random SMTP Fun with Telnet

You may remember the good ole days where you can connect to pretty much any mail server (like Gmail) with telnet and spoof emails to your friends from whoever you want. Back then, I never realized that you could actually send attachments directly through the telnet connection. It’s not super ...