The Critical Need for Multi-Role Testing in Application Security

The Critical Need for Multi-Role Testing in Application Security

As web, thick client, mobile, and IoT applications have become more robust, authentication and authorization has become an incredibly complex […] ...
Examining the Difference Between CTEM and Vulnerability Management

Examining the Difference Between CTEM and Vulnerability Management

I’ve recently been fielding this question in my conversations with customers: “What is the difference between CTEM and Vulnerability Management?”  One […] ...
How Hackers Steal Your RFID Cards

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...
How to Make Adversaries Cry: Part 1

How to Make Adversaries Cry: Part 1

In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1

Leveraging Escalation Attacks in Penetration Testing Environments – Part 1

Authors: George Raileanu and Eugene Mar Introduction Together we aim to explore vulnerabilities within Active Directory Certificate Services (AD CS), […] ...
Introduction to tmux

Leveraging Escalation Attacks in Penetration Testing Environments – Part 2

Authors: George Raileanu and Eugene Mar In this post, we’ll cover the two most common ESC attacks we encounter on […] ...
The Art of Self-Defense: Security Validation Through Attack Simulation

The Art of Self-Defense: Security Validation Through Attack Simulation

Additional authors: Nic Finn Setting the Stage Organizations looking to develop an increasingly proactive defensive strategy are beginning to incorporate […] ...
Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques

Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques

NTLM (NT LAN Manager) relaying is an attack technique that has been around for years yet is still incredibly effective.  […] ...
SCCM Exploitation: Compromising Network Access Accounts 

SCCM Exploitation: Compromising Network Access Accounts 

Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several […] ...