Blog

Home / Blog

Windows UAC Bypass

Windows UAC Bypass

What is UAC? UAC (User Account Control) is a windows security feature that forces any new process to run in non-elevated mode by default. Any

Read More »
What is PCI DSS Pentesting?

What is PCI DSS Pentesting?

Payment Card Industry Data Security Standard (PCI DSS) is a set of rules designed to keep credit cardholder information safe. It is an operational prerequisite

Read More »
OSINT with Maltego

OSINT with Maltego

What is Maltego? Maltego is an application for data mining that mines open-source data sources and generates graphs for relationship analysis. The graphs simplify the

Read More »
Introduction to OSINT

Introduction to OSINT

Technological breakthroughs have revolutionized the entire world into what, at present, is called the information age. One of the most important things about this age

Read More »
IPV6 DNS Takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »
Active Directory Basics

Active Directory Basics

The number of resources such as users, databases, or servers managed in organizations poses questions about accountability as firms adjust to industry needs and norms.

Read More »