🦊 Philo's Garden
Dark mode
Light mode
Search
Search
Search
Explorer
Philosophy
Notebooks
Notebooks
German Idealism
Fichte
General
Hegel
Kant
Schelling
Metaphysics
General
Phenomenology
Critical Phenomenology
De Beauvoir
Fanon
General
Heidegger
Husserl
Levinas
Merleau-Ponty
Sartre
Philosophy of Mind
AI
Poststructuralism
Deleuze and Guattari
Derrida
Foucault
General
Lyotard
Poststructuralist Feminism
20th Century French
Metaphilosophy
Posthumanism, New Materialism etc.
Psychoanalysis
Overview
Tech
AD and Azure AD
Expired passwords
Techniques by Killchain Stage
C2
Discord
SMS
Telegram
Evasion
EDR Evasion
EDR Design and the CrowdStrike Incident
Introduction
Part 1 - The Why and How of EDR
AMSI Bypasses
API Hooks
Callstack Monitoring
Custom loaders
Direct and Indirect Syscalls
ELAM Drivers
ETW
Filesystem Minifilter Drivers
Heap Monitoring
IAT Hooking
Image Load and Registry Monitoring
In-memory Encryption
KAPC Injection
Labs
Network Filter Drivers
Overview
PPID Spoofing
Process and Thread Creation Monitoring
Reflective Module Loadig
ROP Mitigations
RunHTMLApplication Defender Bypass
Sandbox Escapes
Shellcode Injection
SSN Hooking and Crushing
ThreadlessInject
Lateral Movement
SSH
bin2bin obfuscation
String obfuscation
UAC Bypasses
Exploits by CVE
CVE-2023-2598 (Linux Kernel LPE via io_uring OOB)
CVE-2023-4427 (OOB index read in Chrome 115.0.5790.114)
CVE-2023-46251 (Stored DOM XSS in MyBB)
CVE-2023-46604 (Apache ActiveMQ RCE)
CVE-2023-48788 (Fortinet FortiClient EMS SQLi > RCE) one-liner
CVE-2023-49105 (Privesc and RCE in ownCloud)
CVE-2024-21887 (Authenticated Command Injection in Ivanti Connect and Policy Secure)
Infrastructure
Cloud
AWS Stuff
Azure Stuff
GCP Stuff
IAM
Non-hyperscalers
Access (general)
Business stuff
Container Stuff
DNS
Email
Environment segregation
IaC
Immutable OS Stuff
K8s
Logging
Metrics
Migration
Secrets Management
Security Labs
Initial Access
Phishing
Introduction to Red Teaming with Sliver
Index
Part 1 - Introduction
README
Malware Analysis
Case Studies
Environment Detection and Disruption
Random
Mobile Hacking
SMS
Persistence
SSH
Privilege Escalation and Bypasses
UAC Bypasses
Programming
System
C
Introduction to C Programming for Windows
Index
Recon and OSINT
Cloud and SaaS
CTI-based
Darkweb
Domains and DNS + IPs
Email
Hunting through source code for secrets
Phone
Search Engines
Username
Web
WiFi and RF
Web
Payloads
Shells
SQLi
WAF Bypass
XSS
Content Security Policy (CSP)
Recon
Home
❯
Tech
❯
Infrastructure
❯
Access (general)
Access (general)
Oct 08, 2024
1 min read
SSH
SSH Host Key Validatio
Graph View
Table of Contents
SSH
SSH Host Key Validatio
Backlinks
No backlinks found