Skip to main content

One post tagged with "Weaponization"

It refers to the process of developing and deploying payloads or tools that can be used to exploit vulnerabilities and gain unauthorized access to a target system or network. This involves taking a proof-of-concept exploit or vulnerability and turning it into a reliable, usable, and often stealthy tool that can be used to achieve the attacker's goals. Weaponization techniques often focus on evading detection by traditional security controls, such as antivirus software and intrusion detection systems, and may involve using alternative execution methods like scripting languages or fileless malware to deliver the payload.

View All Tags

THM | Weaponization

· 19 min read

Red Teaming | Weaponization | Summary:

The room focuses on alternative scripting techniques used by red teamers to execute payloads in a Windows environment.

Since many organizations restrict or monitor the execution of .exe files, this room explores other methods, including Windows Script Host, HTML Applications, Visual Basic Applications, and PowerShell.

The goal is to learn and practice these techniques, which are commonly used by attackers to bypass security controls and execute malicious code.