Ryan Gandrud
More by Ryan Gandrud
Targeting Passwords for Managed and Federated Microsoft Accounts
May 2, 2017
This blog dives into the two different ways a Microsoft domain can support cloud authentication; managed and federated.
Adding Web Content Filter Exceptions for Phishing Success
April 26, 2016
During phishing engagements, one of the key steps is to ensure that targeted users can access your phishing website. These filtering services can often cause problems...
All You Need Is One – A ClickOnce Love Story
March 23, 2015
Although there are many legitimate advantages to using ClickOnce deployments, it also provides a vector for malicious actors to compromise user’s machines with just one click.
Bypassing AV with Veil-Evasion
July 14, 2014
Veil-Framework is a collection of tools that help with information gathering and post-exploitation. One such tool is Veil-Evasion which is used for creating payloads that can easily bypass Antivirus using known and documented techniques. This is done through an array of encoding schemes that change the signatures of files dramatically enough to avoid standard detection techniques.
15 Ways to Download a File
June 16, 2014
Pentesters often upload files to compromised boxes to help with privilege escalation, or to maintain a presence on the machine. This blog will cover 15 different ways to move files from your machine to a compromised system.
Executing MSF Payloads via PowerShell Webshellery
April 14, 2014
Many web applications come with the ability to upload files to the server. Some of these can be misconfigured and allow for arbitrary file upload. During these situations, this module for MetaSploit can come in handy if the backend server is Windows.