Roasting and ACL domain attacks

Now after we have the domain information, we move on to the next phase of…


Domain Information Collection Tools

So, we have a domain user or computer account. To continue testing, we need to…


Domain Attacks. Getting an account

During penetration testing, we often detect errors in the domain configuration.…


Fresh Remote Command Execution in Exim 4.92 in one request

More recently, at the beginning of summer, there were massive calls for…


Technical details of hacking Capital One bank on AWS

On July 19, 2019, Capital One Bank received a message, of which is afraid every…


About admins, DevOps, endless confusion and DevOps transformation within the company

What is needed for the success of an IT company in 2019? Lecturers at…


Who is using SAML 2.0 authentication protocol

In our blog, we often touch issues of data protection and authorization. For…


Dangerous IoT: threats for business and ways to solve the problem

Network technologies have made the world very small, in the sense that they…