{"uuid": "edd459b8-0fb4-4020-bc35-cf711e24fc69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0402", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11946", "content": "#Red_Team_Tactics\n1. Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets\nhttps://github.com/Aur3ns/lsassStealer\n2. Bypassing Windows Defender Application Control with Loki C2\nhttps://securityintelligence.com/x-force/bypassing-windows-defender-application-control-loki-c2\n3. Exploiting CVE-2024-0402 in GitLab\nhttps://blog.doyensec.com/index.html", "creation_timestamp": "2025-03-20T10:49:13.000000Z"}