Blog
Home / Blog

Understanding Active Directory Certificate Services (AD CS)
Understanding Active Directory Certificate Services (AD CS) AD CS is a server role integral to Microsoft’s public key infrastructure (PKI) implementation. It tightly integrates with

Asus RT N12 + B1’s CSV Injection CVE-2024-28328
A vulnerability has been uncovered in the Asus RT N12+ B1 router, specifically related to CSV Injection. This flaw poses a significant threat to device

Tenda N300 F3 Router Password Policy Bypass Vulnerability
In January 2024, while conducting security assessments, our team stumbled upon a critical vulnerability in the Tenda N300 F3 Router. Recognizing the potential impact on

Abusing Active Directory Certificate Services: A Comprehensive Guide
Organizations operate in an ever-evolving digital environment that poses security threats. Although much attention has been focused on various components of Active Directory (AD), one

Understanding Buffer Overflow: Protecting Systems from Vulnerabilities
Introduction to Buffer Overflow Buffer overflow is an alarming security threat that could allow attackers to gain unauthorized access or execute malicious code in an attack environment.

Master Wi-Fi Connectivity with NodeMCU: Unleashing the Power of Wi-Fi Wizardry
Wi-Fi connectivity has become an integral component of modern life, offering wireless Internet access on various devices. Understanding its fundamental workings is key to optimizing

Unleashing the Potential of Certificates for Privilege Escalation
Maintaining proactive defences against emerging cyber threats is of the utmost importance in today’s rapidly changing cybersecurity environment, and one area that has gained more

Zero Day in Xbox Privilege Escalation using Gaming ServiceEoP
Xbox Privilege Escalation is a serious security vulnerability on Xbox gaming platforms that could allow an attacker to escalate user privileges and gain system-level access

Leveraging Win32 APIs in C# using Platform Invokation(P/Invoke)
Win32 APIs, also referred to as Windows API or Win API by Microsoft, provide developers with an interface with the Windows operating system. They act

Unveiling Moniker Link (CVE-2024-21413): Navigating the Latest Cybersecurity Landscape
An intriguing vulnerability in Outlook’s handling of particular hyperlinks has been found, and threat actors have been known to use it in the wild. CVE-2024-21413

Process Injection: Harnessing the Power of Shellcode
Process Injection Process injection is an advanced penetration testing technique used by experienced penetration testers to introduce malicious code into non-malicious processes, infiltrating stealthily without

Decoding the Mystery: Identifying Unlabelled UART Pins
Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners