Legitimate use of Cytomate

Legitimate use of Cytomate

Cytomate is a powerful tool, a dishonest customer could use it to harm its competitors. Cytomate has taken different precautions in different modules to avoid illegitimate use. Cytomate provides each agent with a set of credentials to login to the cloud web interface. Cytomate endpoint module is equipped with different types of malwares, ransomware and worms and trojans to test endpoint security controls. To avoid scenarios where a customer uses Cytomate endpoint to test the endpoint which he does not own, Cytomate requires a lightweight agent to be set up on the endpoint. Cytomate uses this agent to test corporate endpoint security controls and communicate with the endpoint server.

REVERSE SHELL OVERSHADOWS REVERSE METERPRETER

REVERSE SHELL OVERSHADOWS REVERSE METERPRETER

In my early days of malware development and penetration testing, like everybody else I had started by injecting malicious shellcodes into the memory of victim pc to gain access over the C2 server using a popular pen-testing tool called Metasploit framework console. MSF console is a very useful tool for advanced penetration testing if used properly.

Analysis of CVE-2021-40444

Analysis of CVE-2021-40444

it was CVE-2020-40444 MSHTML Remote code execution vulnerability and its attack cycle included Microsoft Word as a victim process that initiates the attack

The epitome of evasion! A custom shellcode

The epitome of evasion! A custom shellcode

Shellcode injection is one of the most used defence evasion technique because shellcode is injected into a volatile memory therefore there are no traces left of any exploitation.

Are you looking for