Blog
Home / Blog

Understanding CRLF Injection Attacks
Understanding CRLF Injection Attacks July 19, 2023 Web Application Tarak Sakhardande In web security, CRLF Injection Attacks remain a potent threat. This blog aims to

Exploiting MS SQL Servers
Exploiting MS SQL Servers July 18, 2023 Active Directory Shashi Kant Prasad As companies continue to rely on databases to store sensitive information, securing the

BloodHound Cheat Sheet
BloodHound Cheat Sheet July 17, 2023 Active Directory Kunal Kumar BloodHound is a powerful security tool that uses graph theory to reveal the relationships between

Resource-Based Constrained Delegation (RBCD) Attack
Resource-Based Constrained Delegation (RBCD) Attack July 15, 2023 Active Directory Shashikant Prasad Resource-Based Constrained Delegation (RBCD) is a feature introduced in Windows Server 2012 that

AS-REP Roasting
AS-REP ROASTING July 15, 2023 Active Directory Karan Patel Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While

Exploiting Active Directory Certificate Services (AD CS)
Exploiting Active Directory Certificate Services (AD CS) July 13, 2023 Active Directory Karan Patel With the increasing use of digital certificates for encryption, authentication, and

A Comprehensive Guide to Android Penetration Testing
A Comprehensive Guide to Android Penetration Testing July 13, 2023 Informational Karan Patel Android penetration testing is a crucial aspect of ensuring the security of

What is Objective-Based Penetration Testing?
What is Objective-Based Penetration Testing? July 11, 2023 Informational Avinash Sahani In today’s digital landscape, where cyber threats loom large, organizations increasingly recognize the importance

Pen testing vs Bug Bounty
Pen testing vs Bug Bounty July 10, 2023 Informational Kunal Kumar Penetration testing (pen testing) and bug bounty programs are two popular methods of ensuring

Maximizing Active Directory Security: Tips and Best Practices
Maximizing Active Directory Security: Tips and Best Practices July 08, 2023 Informational Shashi Kant Prasad Active Directory (AD) is integral to many organizations’ IT infrastructures,

How OSINT Can Revolutionize Your Information Gathering
How OSINT Can Revolutionize Your Information Gathering July 07, 2023 Informational Joseph Simon OSINT, also known as Open Source Intelligence, plays a pivotal role in

Mastering Scoping: The Key to Effective Penetration Testing
Mastering Scoping: The Key to Effective Penetration Testing July 06, 2023 Informational Atharva Nanche As cyber security threats have continuously evolved, penetration testing has become