SECURITY BLOGS

Explore the Datacell security blog for valuable insights and thought leadership on industry best practices in managed security services and enterprise security trends

duck
Uncategorized

PWN3D In Seconds – Attack of the Rubber Duck

In this blog, we’ll be looking at the USB Rubber Ducky or the BadUSB. We’ll start by an introduction to BadUSBs, what ma...

Active Directory
Uncategorized

Active Directory Domain Enumeration & Exploitation using BloodHound

In this blog, we will have an in-depth look at BloodHound. We will start by discussing what BloodHound is, how to instal...

BoF
Uncategorized

Exploiting A Simple Stack-Based Buffer Overflow Vulnerability

In this blog, we will be discussing the basics of exploit development by exploiting a stack overflow vulnerability in a ...

Active Directory
Uncategorized

Letting the Secrets “Sync” In – DCSync Attack

In this blog, we’ll be focusing on abusing the Replication of Directory Services feature of an Active Directory environm...

Active Directory
Uncategorized

Kerberoasting – Roasting the Three Headed Guard of Microsoft Active Directory

This attack targets the Kerberos Authentication Protocol in an Active Directory environment, and attempts to retrieve th...

Active Directory
Uncategorized

Abusing the Rights and Privileges of DNS Admins to own the Domain Controller – Windows Red Teaming

This attack demonstrates how an attacker can abuse some Active Directory misconfigurations and rights of the DNS Admins ...