Blog

Home / Blog

Kerberos Attacks- Part 1

Kerberos Attacks- Part 1

As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Read More »
Windows UAC Bypass

Windows UAC Bypass

What is UAC? UAC (User Account Control) is a windows security feature that forces any new process to run in non-elevated mode by default. Any

Read More »
What is PCI DSS Pentesting?

What is PCI DSS Pentesting?

Payment Card Industry Data Security Standard (PCI DSS) is a set of rules designed to keep credit cardholder information safe. It is an operational prerequisite

Read More »
OSINT with Maltego

OSINT with Maltego

What is Maltego? Maltego is an application for data mining that mines open-source data sources and generates graphs for relationship analysis. The graphs simplify the

Read More »