Roasting and ACL domain attacks
Now after we have the domain information, we move on to the next phase of…
Domain Information Collection Tools
So, we have a domain user or computer account. To continue testing, we need to…
Domain Attacks. Getting an account
During penetration testing, we often detect errors in the domain configuration.…
Fresh Remote Command Execution in Exim 4.92 in one request
More recently, at the beginning of summer, there were massive calls for…
Technical details of hacking Capital One bank on AWS
On July 19, 2019, Capital One Bank received a message, of which is afraid every…
About admins, DevOps, endless confusion and DevOps transformation within the company
What is needed for the success of an IT company in 2019? Lecturers at…
Who is using SAML 2.0 authentication protocol
In our blog, we often touch issues of data protection and authorization. For…
Dangerous IoT: threats for business and ways to solve the problem
Network technologies have made the world very small, in the sense that they…