Blog

Home / Blog

A redfox Cybersecurity on BloodHound tool

BloodHound Cheat Sheet

BloodHound is a powerful security tool that uses graph theory to reveal the relationships between users, groups, and computers in a domain. In this comprehensive

Read More »
A Redfox Cybersecurity blog on AS-REP Roasting attack, and the tools required to perform it.

AS-REP Roasting

‍Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While it is an essential component of network security, it

Read More »
Part one of the blog series on attacking Kubernetes

Attacking Kubernetes (Part 1)

Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

Read More »
Redfox Cybersecurity blog on attacking Kerberos delegations

Kerberos Attacks (Part 2)

In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and

Read More »
Redfox Cybersecurity blog on attacking Kerberos delegations

Attacking Kerberos Delegation

Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment.  Topics covered:  Basic principles

Read More »
Part one of Redfox Cybersecurity blog on Kerberos Attacks

Kerberos Attacks- Part 1

As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Read More »
A Redfox Cybersecurity blog on IPV6 DNS takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »