Abusing Exported Functions
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

Abusing Exported Functions
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
Rating
3.8 / 5.0
Pricing
Contact vendor
Deployment
SaaS / Cloud
Category
Offensive Security
Product Description
A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
Contact Vendor
Interested in Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement? Get in touch with the vendor.
arrow_upwardPOPULAR
IGRC Square
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a
Bulwark Technologies
Bulwark Technologies is a cybersecurity distributor focused on the Middle East, with headquarters in Dubai and regional offices in Saudi Arabia and India. The company acts as a value-added distributor
ICT Misr
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Cyber 50 Defense
Cyber 50 Defense is an UAE-based cybersecurity company offering governance, risk and compliance (GRC) solutions, 24/7 managed protection, security assessments, incident response, and compliance servic