Network Penetration Testing: Essential Tips from a Seasoned Pen Tester 

Penetration testing, often referred to as pen testing, is a critical component of any organization’s cybersecurity strategy. It involves simulating real-world cyber attacks to evaluate the security of a system, network, or application. The primary goal is to uncover weaknesses before malicious actors can exploit them. The importance of penetration testing cannot be overstated, especially...

Exploiting Weak ACLs on Active Directory Certificate Templates: ESC4

In Active Directory (AD) security, one area that has been gaining attention is the exploitation of misconfigured Active Directory Certificate Services (ADCS) and, in particular, weak access control lists (ACLs) on certificate templates. These vulnerabilities can lead to domain escalation and compromise the security of an entire network. In this blog, we will explore the...

A Guide to Pen Testing in the Azure AD Environment

Azure Active Directory (Azure AD) is a cloud-based identity and access management service provided by Microsoft. It plays a vital role in the Azure environment, serving as the cornerstone for authentication and authorization across Azure services. Azure AD allows organizations to manage and secure user identities, enforce access policies, and enable single sign-on to various...

7 Essential Steps for an Effective Yearly Penetration Testing Plan

Embarking on a journey to fortify your digital defences against cyber threats requires a well-crafted and comprehensive yearly penetration testing plan. In this blog, we’ll explore the seven essential steps that form the backbone of an effective strategy to ensure the security of your organization’s digital assets.   Understanding Penetration Testing (Pen Test)  Penetration testing (pen...

Cross-Site Request Forgery (CSRF) for Pen Testers

As Pen Testers, one of our main roles are identifying and mitigating vulnerabilities that could lead to security breaches. Cross-Site Request Forgery (CSRF) attacks often go undetected but have severe repercussions if left unaddressed; we will explore this attack type further in this blog and examine their fundamentals as well as understand their significance as...