Kerberos Attacks- Part 1

Kerberos Attacks- Part 1

As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Read More »
IPV6 DNS Takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »
JWT Authentication Bypass

JWT Authentication Bypass

What are JWTs? JSON web tokens (JWTs) are a standardized format for sending cryptographically signed JSON data between systems. Theoretically, they can contain any kind

Read More »