Blog

Home / Blog

Fox in a hoodie at multiple monitors, visual for a BloodHound cheat sheet on Active Directory attack-path analysis and defensive hunting.

BloodHound Cheat Sheet

BloodHound is a powerful security tool that uses graph theory to reveal the relationships between users, groups, and computers in a domain. In this comprehensive

Read More »
Fox in a hoodie facing city lights with glowing servers, symbolizing AS-REP Roasting and Kerberos authentication security.

AS-REP Roasting

‍Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While it is an essential component of network security, it

Read More »
Kubernetes attack

Attacking Kubernetes (Part 1)

Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

Read More »

Kerberos Attacks (Part 2)

In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and

Read More »

Attacking Kerberos Delegation

Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment.  Topics covered:  Basic principles

Read More »
Kerberos Attacks- Part 1

Kerberos Attacks- Part 1

As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Read More »
IPV6 DNS Takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »