Pwning the Domain: With Credentials

Pwning the Domain: With Credential EBook

The “Pwning the Domain: With Credentials” article series presents a comprehensive exploration of techniques used by attackers to exploit Active Directory environments. Key findings include the significance of proper enumeration of domain accounts using tools like BloodHound and PowerView, the

Read More
Pwning the Domain: With Credentials

Pwning the Domain: With Credentials

Domain Account After getting access to a domain account, there are a variety of things that can be done including but not  limited to: domain enumeration, Kerberoasting, coercion, etc. Enumeration There are many options for enumerating the domain once you

Read More
Threat Intel Roundup: Outlook, SmartScreen, Lockbit

Threat Intel Roundup: Outlook, SmartScreen, Lockbit

it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated with various vulnerabilities and threats:

Read More
GL.iNet GL-AX1800 CVE-2023-47464

GL.iNet GL-AX1800 Critical Vulnerability CVE-2023-47464

Executive Summary This report outlines the findings of a comprehensive security assessment conducted on the GL-AX1800 router manufactured by GL.iNet. The assessment aimed to identify potential vulnerabilities and weaknesses in the device’s security measures. During the evaluation, several critical security

Read More
Pwning the Domain: Credentialess/Username

Pwning the Domain: Credentialess/Username

Reconnaissance Reconnaissance is an important step when engaging in a red teaming/penetration testing assessment. It may provide you the information you need later on while it may not seem so important in the meantime, For example you may stumble upon

Read More
moxa ioLogik E1212 Vulnerabilities

moxa iologik e1212 vulnerabilities EBook

During our thorough assessment of the Moxa ioLogik E1212 series, we uncovered critical vulnerabilities that pose significant risks to the security of the system. These vulnerabilities encompass various attack vectors, including Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), cryptographic failures,

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.