Latest Posts

Forced Authentication

Vulnerability Spotlight: Forced Authentication

Abusing forced authentication for credentialed access and privilege escalation.

Breaking Bad Backups

Pentester Perspective: Breaking Bad Backups

Common backup related weaknesses and how they can be exploited by an attacker.

Your Badge is My Badge

Your Badge is My Badge: Real World Lessons From Physical Security Engagements

An overview of physical security weaknesses and common bypass techniques.

ARP Adversary-in-the-Middle

Vulnerability Spotlight: ARP Adversary-in-the-Middle (AITM)

ARP poisoning techniques that enable interception of Kerberos authentication traffic to steal domain credentials.

View All Posts