Kubernetes attack

Attacking Kubernetes (Part 1)

Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

Read More »

Kerberos Attacks (Part 2)

In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and

Read More »

Buffer Overflow Basics

Buffer overflow is a vulnerability where a program tries to store more data in a buffer than it can hold, potentially overwriting important data or

Read More »
Why do we need a Web App Pentest

Why do we need a Web App Pen test

Vulnerability assessments use automation to routinely scan for routers, firewalls, servers, applications, and switches. Web application penetration testing has a limited scope. A web application

Read More »
Misconfigured Amazon S3 Buckets

Misconfigured Amazon S3 Buckets

What is Amazon S3? Excerpt from AWS documentation: Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security,

Read More »