Stay connected

Trending News

Abusing COM & DCOM objects
News, White Papers

Abusing COM & DCOM objects 

IntroductionNowadays organization’s security members became familiar with most of popular lateral movements techniques, which makes red teaming more difficult, therefor applying the latest techniques of initial access and lateral movements is a crucial for a successful attack, in this paper we will cover some aspects…

SMB Enumeration & Exploitation & Hardening
News, White Papers

SMB Enumeration & Exploitation & Hardening 

IntroductionWhat is SMB?SMB (Server Message Block) is a network protocol for accessing files, printers and other deviceson the network. Server Message Block provides file sharing, network browsing, printing services,and interprocess communication over a network. Most usage of SMB involves computersrunning Microsoft Windows, where it was…

Active Directory DCSync
News, White Papers

Active Directory DCSync 

INTRODUCTIONIn many environments Domain Controller and Active Directory are used to manage the network, users and computers. The organizations often need the existence of more than one Domain Controller for its Active Directory. For keeping an environment with more than one Domain Controller consistent, it…