Blog
Home / Blog

Tenda N300 F3 Router Password Policy Bypass Vulnerability
In January 2024, during one of our scheduled security assessments, our team identified a critical vulnerability affecting the Tenda N300 F3 Router. As this device

Abusing Active Directory Certificate Services: A Comprehensive Guide
Organizations operate in an ever-evolving digital environment that poses security threats. Although much attention has been focused on various components of Active Directory (AD), one

Understanding Buffer Overflow: Protecting Systems from Vulnerabilities
Buffer overflow is one of the most persistent and dangerous security threats in computing. It can allow attackers to gain unauthorized access, execute malicious code,

Master Wi-Fi Connectivity With NodeMCU: Unleashing The Power Of Wi-Fi Wizardry
Wi-Fi is no longer a luxury—it’s the backbone of our modern, connected world. From smartphones and laptops to smart appliances and IoT devices, almost every

Unleashing The Potential Of Certificates For Privilege Escalation
Maintaining proactive defences against emerging cyber threats is more critical than ever in today’s evolving landscape. One area gaining increasing attention is privilege escalation—the process

Zero Day In Xbox Privilege Escalation Using Gaming ServiceEoP
Microsoft’s Xbox has evolved from a gaming console into a comprehensive entertainment ecosystem used by millions worldwide. However, like any complex software system, it is

Leveraging Win32 APIs In C# Using Platform Invokation(P/Invoke)
The Win32 API—also known as the Windows API—provides developers with direct access to the core functionalities of the Windows operating system. Acting as a bridge

Unveiling Moniker Link (CVE-2024-21413): Navigating The Latest Cybersecurity Landscape
An alarming new vulnerability has shaken the cybersecurity community. An intriguing flaw in Microsoft Outlook’s handling of specific hyperlink formats has been actively exploited in

Process Injection: Harnessing The Power (Responsibly)
Process Injection Process injection is an advanced penetration testing technique used by experienced penetration testers to introduce malicious code into non-malicious processes, infiltrating stealthily without

Decoding the Mystery: Identifying Unlabelled UART Pins
Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners

Securing Web Uploads: Extension Denylisting
At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Decoding I2C: Mastering the Communication Protocol
In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,