blog

Our latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Exploiting SSH key based authentication
Pentests

This is rather be a quick post and intended to be a reference note for me (and you all).

ColdFusion 10 Remote File Disclosure Exploit
Pentests

ColdFusion had several exploits in the past. ColdFusion 10 being the latest and stable release from Adobe it was hard to find any ready exploits.

Utilizing Metasploit Database in Network Pentest
Pentests

What’s the first thing come to your mind when you think of doing network pentest of over 1000 IPs in couple of weeks? Is it really possible? Answer is YES!!!

GraphQL Penetration Testing
Pentests

We have had a couple of penetration test engagements that involved GraphQL endpoints. At first, it looked complex and we sketched out the methodology and approach to perform the penetration test. Here’s how it went,

Tools, Techniques & Processes: From Zero to Domain Administrator
Pentests

We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.

Leveraging Log4j Exploit to Domain Administrator
Pentests

We recently performed another internal network assessment with the goal to gain Domain Administrator access on the target network. We had unauthenticated access to the network, i.e. unauthorized user or an internal attacker onto the user LAN.

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.