Author: Deepinstinct
Summary :
Curiosity drives cybersecurity professionals to explore attack methodologies for effective defense. This article discusses innovative techniques for DLL injection and privilege escalation discovered through research on Microsoft Office’s RPC servers and the App Compatibility framework. #Cybersecurity #DLLInjection #PrivilegeEscalation
Keypoints :
Curiosity is essential for cybersecurity professionals to understand attack methodologies.…In May 2023, the Ukrainian CERT published advisory #6710 about a threat actor dubbed “UAC-0099.”…
The contents of this blog post were originally scheduled to be presented during an upcoming cybersecurity conference. However, interest in this topic has heightened due to the war in Israel and a suspected ongoing attack against Israeli targets. As such, we have decided to publish the relevant findings from the presentation now.…