In today’s post we are going to exploit one-way trust relationships, from an inbound point of view. If you haven’t seen it yet, take a…
Hacking Lethani
Let’s continue with the posts on Red Teaming. After the post on how to exploit misconfigured Certificate Templates, today we will talk about the forests,…
Today I would like to talk about a vulnerability that I have found frequently in the Red Team exercises I have participated in. It is…
Today I find it necessary to move away from the technical side of this website to an opinion piece. I have been in the cybersecurity…
A few days ago I participated with a colleague in a Red Teaming exercise. I’m just starting out in this kind of exercise (I hope…
Earlier this year I passed the CISSP on the first attempt. This is another of the many articles that exist on how to pass the…
0. Rooting Android & Jailbreaking iOS Android It is recommended to use an android device to test the application. If you cannot get one, then…
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in all major Linux distributions and in some Unix-like operating systems, has just appeared and…
In the last few weeks there has been a revolution in the IT world. Everyone has been worried, there have been thousands of meetings to…
Two-step or multi-step authentication is a great enhancement to account security, but phishing attacks remain a danger.