Welcome
![Hello and Welcome All](https://dxj7eshgz03ln.cloudfront.net/production/textual/image/901126/twenty_by_nine_extra_large_55f8fe9e-a4c4-491c-b8b4-7396782895dd.png)
Hello and Welcome All
Hope everyone had a Haunted ... but Happy ... Halloween!
Thank you to our Meeting Presenters who did a terrific job sharing information. Always a new angle or thought process to consider.
Interested in helping out...Reach out to us on our contact page at ISC2CT.org.
Check out our site in a week to see upcoming events and our Holiday Party!
GitTech (Use Caution)
![GitHub - ryd3v/notesVault: notesVault Encrypted Notes App](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901129/twenty_by_nine_extra_large_92621f8e-c0a8-42b4-adeb-66209162fdb5.png)
GitHub - ryd3v/notesVault: notesVault Encrypted Notes App
notesVault Encrypted Notes App. Contribute to ryd3v/notesVault development by creating an account on GitHub.
![GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901130/twenty_by_nine_extra_large_b8c6f3fc-2423-4a7a-bd3f-c499fc8b4571.png)
GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. - GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
![Introducing GraphRunner: A Post-Exploitation Toolset for Microsoft 365 - Black Hills Information Security](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901136/twenty_by_nine_extra_large_4637701c-fdcd-4ea3-ae47-087a234e984d.jpeg)
Introducing GraphRunner: A Post-Exploitation Toolset for Microsoft 365 - Black Hills Information Security
By Beau Bullock & Steve Borosh TL;DR We built a post-compromise toolset called GraphRunner for interacting with the Microsoft Graph API. It provides various tools for performing reconnaissance, persistence, and […]
Cyber News
![Critically close to zero (day): Exploiting Microsoft Kernel streaming service](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901141/twenty_by_nine_extra_large_ffce8fc2-9410-4645-8487-981e8ab5d760.jpeg)
Critically close to zero (day): Exploiting Microsoft Kernel streaming service
Microsoft recently found and patched a vulnerability in the Microsoft Kernel streaming service. Learn more here.
![Make Your tools speak. | by Whalebone | Oct, 2023 | Medium](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901128/twenty_by_nine_extra_large_28f7702d-47f6-42ec-9327-e671fbf30531.png)
Make Your tools speak. | by Whalebone | Oct, 2023 | Medium
A lot of information can be collected during the reconnaissance process. To do this, you need to be patient and follow precise automated steps to get to a specific point or a situation that’s worth checking for vulnerabilities. This is because a significant amount ...
![Quiz - SocVel.com](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901131/twenty_by_nine_extra_large_6827d802-2d68-4a8a-b3ea-c75ef259e957.jpg)
Quiz - SocVel.com
The SocVel Cybersecurity Quiz [1 OCT 2023] Play this week's quiz, jam-packed with 10 of the most interesting #infosec stories from the past week. Play now!
![SensePost | Browsers’ cache smuggling](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901132/twenty_by_nine_extra_large_02d0f333-a898-4907-b897-73507a19c5f7.png)
SensePost | Browsers’ cache smuggling
...present a technique in which an attacker social engineers a target employee to visit a web site. The web site will then silently place a DLL payload in the browser’s cache, disguised as an image...
![APT Encounters of the Third Kind - Igor’s Blog](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901134/twenty_by_nine_extra_large_0812ce36-a2f4-4d13-8d42-0c998503c1e8.png)
APT Encounters of the Third Kind - Igor’s Blog
A few weeks ago an ordinary security assessment turned into an incident response whirlwind. It was definitely a first for me, and I was kindly granted permission to outline the events in this blog post. This investigation started scary but turned out be quite fun, and I hope reading it will be informative to you too ...
![Perfect DLL Hijacking | Elliot on Security](https://dxj7eshgz03ln.cloudfront.net/production/link/image/901138/twenty_by_nine_extra_large_4e74ca50-80a5-4e69-a08c-ca11e3c26cfc.png)
Perfect DLL Hijacking | Elliot on Security
Disengaging Loader Lock to do anything directly from DLLMain...