Vulnerability Management & Penetration Testing

The Critical Need for Multi-Role Testing in Application Security
As web, thick client, mobile, and IoT applications have become more robust, authentication and authorization has become an incredibly complex […] ...

Examining the Difference Between CTEM and Vulnerability Management
I’ve recently been fielding this question in my conversations with customers: “What is the difference between CTEM and Vulnerability Management?” One […] ...

How Hackers Steal Your RFID Cards
Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...

How to Make Adversaries Cry: Part 1
In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...

SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment
TL;DR: Compromise of an SCCM administrator account can easily lead to compromise of every machine managed by SCCM. As this […] ...

Leveraging Escalation Attacks in Penetration Testing Environments – Part 1
Authors: George Raileanu and Eugene Mar Introduction Together we aim to explore vulnerabilities within Active Directory Certificate Services (AD CS), […] ...

Leveraging Escalation Attacks in Penetration Testing Environments – Part 2
Authors: George Raileanu and Eugene Mar In this post, we’ll cover the two most common ESC attacks we encounter on […] ...

The Art of Self-Defense: Security Validation Through Attack Simulation
Additional authors: Nic Finn Setting the Stage Organizations looking to develop an increasingly proactive defensive strategy are beginning to incorporate […] ...

Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques
NTLM (NT LAN Manager) relaying is an attack technique that has been around for years yet is still incredibly effective. […] ...

SCCM Exploitation: Compromising Network Access Accounts
Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several […] ...