Blog
Home / Blog
- Active Directory
- Android
- API
- AWS
- Azure
- Blog
- Cloud
- Container Security
- Desktop Apps
- Hardware
- ICS
- Informational
- Infrastructure
- iOS
- IoT
- Kubernetes
- Linux
- OSINT
- PCI DSS
- Purple Team
- Red Team
- Reverse Engineering
- Smart Contracts
- Software Supply Chain
- Web Application
- Wireless Network
- Managed SOC
- Managed SOC
- Managed SOC
- VIDEOS
- Blog
- Videos
- Hardware Security Assessments
- Kubernetes configuration reviews
- Threat Modeling
- OSINT
- External Network Penetration Testing
- Cloud Penetration Testing
- Smart Contracts Security Assessments
- Wireless Network Penetration Testing
- Firewall Configuration Reviews
- Phishing Simulations
- Host Reviews

GPO Abuse
Group Policy Objects (GPOs) are a powerful tool administrators use to manage and enforce security policies across a domain. However, in the wrong hands, GPOs

Introduction to C2 Frameworks
Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in the ever-evolving cybersecurity landscape. These frameworks are commonly employed by threat

Abusing ACL Misconfigurations
Access Control Lists (ACLs) are a crucial component of securing data and resources in an IT infrastructure. By assigning permissions to users and groups, ACLs

Discovering Internet Accessible Devices with Shodan
In the vast landscape of the internet, a hidden world of devices is waiting to be discovered. These devices, ranging from servers and routers to

Power of Covenant C2 Framework
In the ever-evolving world of cybersecurity, staying one step ahead of malicious actors is crucial. Command and control (C2) frameworks play a vital role in

DOM-Based Cross-Site Scripting
As the digital landscape continues to evolve, so do the threats that target web applications. Cross-site scripting (XSS) remains a persistent and dangerous vulnerability among

Understanding CRLF Injection Attacks
In web security, CRLF Injection Attacks remain a potent threat. This blog aims to provide comprehensive insight into this malicious technique, its implications, and the

Exploiting MS SQL Servers
As companies continue to rely on databases to store sensitive information, securing the data has become a top priority. MS SQL Server is a popular

BloodHound Cheat Sheet
BloodHound is a powerful security tool that uses graph theory to reveal the relationships between users, groups, and computers in a domain. In this comprehensive

Resource-Based Constrained Delegation (RBCD) Attack
Resource-Based Constrained Delegation (RBCD) is a feature introduced in Windows Server 2012 that allows administrators to configure which accounts are trusted to delegate on their

AS-REP Roasting
Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While it is an essential component of network security, it

Exploiting Active Directory Certificate Services (AD CS)
With the increasing use of digital certificates for encryption, authentication, and other security purposes, Active Directory Certificate Services (AD CS) has become a critical component