In this blog, we’ll be looking at the USB Rubber Ducky or the BadUSB. We’ll start by an introduction to BadUSBs, what ma...
In this blog, we will have an in-depth look at BloodHound. We will start by discussing what BloodHound is, how to instal...
In this blog, we will be discussing the basics of exploit development by exploiting a stack overflow vulnerability in a ...
In this blog, we’ll be focusing on abusing the Replication of Directory Services feature of an Active Directory environm...
This attack targets the Kerberos Authentication Protocol in an Active Directory environment, and attempts to retrieve th...
This attack demonstrates how an attacker can abuse some Active Directory misconfigurations and rights of the DNS Admins ...