Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
May 10, 2026 · Information Security

Bypassing Traditional WMIExec Detection with a File‑less WMI Lateral Movement Technique

The article dissects a stealthy, file‑less WMI lateral movement method that avoids the obvious Win32_Process.Create signature by hijacking stopped LocalSystem services, leveraging the LOLBIN ScriptRunner.exe to execute remote SMB scripts, automatically restoring the service and leaving minimal forensic traces.

Detection EvasionFileless AttackLOLBIN
0 likes · 7 min read
Bypassing Traditional WMIExec Detection with a File‑less WMI Lateral Movement Technique
Black & White Path
Black & White Path
Apr 22, 2026 · Information Security

Hackers Breach in 27 s, Lateral Move in 4 min: AI Turns 2026 Cybersecurity into a Survival Race

By 2026, generative AI has slashed attack timelines, with CrowdStrike reporting average breach times of 29 minutes and record 27‑second lateral moves, while ReliaQuest notes attackers can begin internal propagation within four minutes, forcing defenders to rethink speed‑focused, multi‑layered security strategies.

AILateral Movementattack speed
0 likes · 12 min read
Hackers Breach in 27 s, Lateral Move in 4 min: AI Turns 2026 Cybersecurity into a Survival Race
Black & White Path
Black & White Path
Mar 17, 2026 · Information Security

Red Team Playbook: From External Breach to Internal Network Domination

This guide walks through the full red‑team workflow—from reconnaissance and initial access through defense evasion, credential theft, lateral movement, and operational security—detailing concrete tools, commands, and techniques for compromising both external and internal networks.

Lateral MovementOPSECOSINT
0 likes · 10 min read
Red Team Playbook: From External Breach to Internal Network Domination
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement?

This article explains the core logic of internal firewalls, outlines compliant bypass techniques for boundary, segmentation, and host firewalls, and then details step‑by‑step lateral movement methods—including credential reuse, tunneling, and legitimate tool abuse—while emphasizing safe, authorized testing practices.

Lateral Movementcredential reusefirewall bypass
0 likes · 33 min read
How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement?
Black & White Path
Black & White Path
Feb 19, 2026 · Information Security

How AI Cracks AWS in Under 8 Minutes, Rendering Cloud Defenses Useless

A Sysdig report shows that attackers using large language models can steal credentials, elevate privileges, move laterally across 19 AWS accounts, hijack Amazon Bedrock models, and abuse GPU resources—all within eight minutes, leaving traditional cloud defenses with virtually no response window.

AIAWSGPU abuse
0 likes · 6 min read
How AI Cracks AWS in Under 8 Minutes, Rendering Cloud Defenses Useless
Black & White Path
Black & White Path
Feb 18, 2026 · Information Security

How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement

This article explains the core logic of internal firewalls, outlines practical techniques for bypassing boundary, segmentation, and host firewalls—including legitimate‑port tunneling, rule‑configuration flaws, jump‑host exploitation, and tunneling methods—and then details step‑by‑step credential‑reuse and tool‑abuse strategies for stealthy lateral movement within a compromised network.

Lateral Movementcredential reusefirewall bypass
0 likes · 35 min read
How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement
Java Tech Enthusiast
Java Tech Enthusiast
Apr 28, 2024 · Information Security

Unexpected Lateral Movement via Windows Delivery Optimization Service

A coworker noticed my computer generating large volumes of traffic on port 7680, prompting an investigation that revealed the svchost.exe process running the default Windows Delivery Optimization Service—intended for LAN‑based Windows Update—mimicking lateral‑movement behavior, which I stopped by disabling the feature.

Lateral MovementPort 7680Windows
0 likes · 4 min read
Unexpected Lateral Movement via Windows Delivery Optimization Service