A redfox Cybersecurity on BloodHound tool

BloodHound Cheat Sheet

BloodHound is a powerful security tool that uses graph theory to reveal the relationships between users, groups, and computers in a domain. In this comprehensive

Read More »
A Redfox Cybersecurity blog on AS-REP Roasting attack, and the tools required to perform it.

AS-REP Roasting

‍Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While it is an essential component of network security, it

Read More »
Part one of the blog series on attacking Kubernetes

Attacking Kubernetes (Part 1)

Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

Read More »
Redfox Cybersecurity blog on attacking Kerberos delegations

Attacking Kerberos Delegation

Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment.  Topics covered:  Basic principles

Read More »
A Redfox Cybersecurity blog on IPV6 DNS takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »
A Redfox Cybersecurity blon blockchain

Blockchain 101

A blockchain is a shared distributed ledger between computer network nodes. It serves as an electronic database for storing data in digital form. Blockchain keeps

Read More »