aws penetration testing

AWS Penetration Testing | Amazon Cloud Security

Migrating your business to the Amazon Web Services (AWS) cloud can be a game-changer, offering scalability, flexibility, and cost-efficiency. But hold on a second! Just like a shiny new car needs insurance, ...
meterpreter dance

Phish Sticks; Hate the Smell, Love the Taste

Phishing SchoolI’ll Make You Great at Phishing or Your Money BackI am already making you better at phishing.Right now.How could that be possible? Please, don’t worry about specifics right now. Just trust that ...
cloud service providers

Cloud Pentesting 101: What to Expect from a Cloud Penetration Test?

Hold on, let’s guess.  You’ve moved a ton of your business to the cloud – storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of other benefits.  ...
Red Teaming, cybersecurity,

Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming

Red Teaming exercises bring in a team of reliable experts who can demonstrate what your organization's cybersecurity really looks like. Here’s how they work ...
Security Boulevard
SCCM Exploitation: Compromising Network Access Accounts 

SCCM Exploitation: Compromising Network Access Accounts 

Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several […] ...
Essential Elements of Penetration Testing Reports: What You Need to Know

Essential Elements of Penetration Testing Reports: What You Need to Know

You’ve invested in a penetration test. Great news!  You’ve taken a crucial step towards shoring up your organization’s security.   But the battle isn’t over yet.  That hefty report you just... The post ...
api penetration testing

The Only API Penetration Testing Checklist You Need

Applications are the workhorses of your business, but imagine the chaos if their communication channels, the APIs were compromised. Today, APIs (Application Programming Interfaces) are the hidden doorways through which 83% of ...
high-level working of the method

How to Intercept Traffic from Proxy Unaware Application Using DNSChef

In this blog, we will dive into an interesting method for intercepting traffic from applications implementing SSL Pinning and applications that do not respect system proxies. Xamarin, for instance, relies on the ...
Ghostwriter v4.1: The Custom Fields Update

Ghostwriter v4.1: The Custom Fields Update

Let’s dive into what makes this so exciting! There’s so much to cover that we won’t be offended if you want to look at the CHANGELOG for a quick synopsis.Introducing Customizable FieldsOver ...
How did CVE-2024-27198 Lead to Critical Vulnerability in JetBrains?

How did CVE-2024-27198 Lead to Critical Vulnerability in JetBrains?

CVE-2024-27198 Lead to Server Takeover Vulnerabilities The post How did CVE-2024-27198 Lead to Critical Vulnerability in JetBrains? appeared first on Kratikal Blogs ...

Secure Coding Practices