Threat & Attack Simulation

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...

Building a Hardware Hacking Arsenal: The Right Bits for Every Byte
In our last IoT blog post we dove headfirst into IoT Security Assessments with a crash course in the methodology […] ...

How Hackers Steal Your RFID Cards
Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...

How to Make Adversaries Cry: Part 1
In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...

SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment
TL;DR: Compromise of an SCCM administrator account can easily lead to compromise of every machine managed by SCCM. As this […] ...

The Art of Self-Defense: Security Validation Through Attack Simulation
Additional authors: Nic Finn Setting the Stage Organizations looking to develop an increasingly proactive defensive strategy are beginning to incorporate […] ...

Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques
NTLM (NT LAN Manager) relaying is an attack technique that has been around for years yet is still incredibly effective. […] ...

SCCM Exploitation: Compromising Network Access AccountsÂ
Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several […] ...

A Crash Course in Hardware Hacking Methodology: The Ones and Zeros
Author: Nathan Keys The Internet-of-Things (IoT) has quickly and seamlessly become woven into the fabric of our daily existence. With […] ...

SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System DiscoveryÂ
Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account […] ...