Fox-headed hacker in red hoodie with glowing fox emblem kneels in a neon-lit server room, symbolizing Havoc C2 framework.

Havoc C2 Framework

Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer everything you need to complete a pen test or red

Read More »
Fox-hooded figure managing multiple servers and monitors, representing command and control (C2) frameworks in cybersecurity.

Introduction to C2 Frameworks

Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in the ever-evolving cybersecurity landscape. These frameworks are commonly employed by threat

Read More »
Kerberos Attacks- Part 1

Kerberos Attacks- Part 1

As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Read More »
IPV6 DNS Takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »
JWT Authentication Bypass

JWT Authentication Bypass

What are JWTs? JSON web tokens (JWTs) are a standardized format for sending cryptographically signed JSON data between systems. Theoretically, they can contain any kind

Read More »