Practice Makes Perfect: Testing Critical Applications with Adversary Simulation
In today’s rapidly evolving digital landscape, protecting sensitive data, and ensuring robust security measures is of paramount importance. One area that has made recent headlines – and therefore requires special attention – is Identity and ...
Read More about Practice Makes Perfect: Testing Critical Applications with Adversary Simulation
Show Filters
USB Drives, Desktop.ini, and NTLM hashes
USB dropping is one of those famous ‘hacker’ moves from the 2000’s that lives on in infamy.
A Valiant Effort at a Stealthy Backdoor
We will be discussing a technique that isn't utilized too often anymore and has been around for m...
Biscom Secure File Transfer Arbitrary File Download
Biscom Secure File Transfer is an application that gives the ability for companies to share files...
Read More about Biscom Secure File Transfer Arbitrary File Download
Penetration Testing with Splunk
Splunk has released an excellent blog post covering the best practices for deploying Splunk securely
Dissecting Veil-Evasion Powershell Payloads and Converting to a Bind Shell
There are many popular and powerful payloads available to us as penetration testers, and oftentim...
Read More about Dissecting Veil-Evasion Powershell Payloads and Converting to a Bind Shell