<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>LNK on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/lnk/</link><description>Recent content in LNK on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 13 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/lnk/index.xml" rel="self" type="application/rss+xml"/><item><title>ELK-BumbleBee - GOLD CABIN</title><link>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</link><pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</guid><description>An employee at CompliantSecure received a phishing email from emkei.cz, downloaded a malicious ISO containing BumbleBee loader 23.dll, which established C2 to 3.68.97.124 and injected into ImagingDevices.exe, dumped LSASS credentials, laterally moved to DC01 via PsExec using markw credentials, staged AdFind and AnyDesk, created sql_admin backdoor account, moved to FileServer01 and Support01, exfiltrated archived share data, and deployed Conti ransomware dropping R3ADM3.txt ransom notes.</description></item><item><title>HTB-Liberty</title><link>https://hexpysya.github.io/investigations/htb-liberty/</link><pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-liberty/</guid><description>Password spraying led to domain account compromise, followed by NetNTLM hash theft via a malicious .url file, RDP access, data exfiltration to a C2 server, and PSWA backdoor installation for persistence.</description></item><item><title>THM-Phishing Unfolding</title><link>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</guid><description/></item><item><title>HTB-A Call from the Museum</title><link>https://hexpysya.github.io/investigations/htb-a-call-from-the-museum/</link><pubDate>Sat, 07 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-a-call-from-the-museum/</guid><description>A phishing email with a password-protected ZIP delivered an LNK file that executed an obfuscated PowerShell stager — collecting system fingerprint data, checking in to a C2, and fetching a next-stage implant using hardcoded credentials. A decoy PDF was opened simultaneously to distract the victim.</description></item></channel></rss>