Jul 25, 2023 | Articles, Information Security
Penetration testing has different methods of execution. In this article we’ll see the difference between Internal and External Pentesting, why both are needed and what benefits your company would get from each one.
Jul 1, 2023 | Articles, Write up
In this article, we explore the essential techniques used during the post-exploitation phase in penetration testing and red teaming. We will demonstrate methods for covering traces within a system, such as modifying log files and timestamps, to evade detection and maintain long-term access for further testing.
Jun 14, 2023 | Articles, Write up
This write-up explains the importance and benefits of using SRUM (System Resource Utilization Management Database) and SRUM Dump tool on Windows Systems from a digital forensics investigation point of view. It can help digital forensics investigators or Information Security professionals understand what criminals did and prove it in a scientific way.
May 8, 2023 | Articles, Write up
This article aims to enhance your ability to detect IDOR vulnerabilities more efficiently and take your discovery process to the next level. Additionally, you will learn how to utilize Autorize, a powerful Burp Suite extension that streamlines the testing process for access control vulnerabilities in web apps.
Apr 1, 2023 | Articles, Hacking Stories
In this article, we explore the fascinating life of Hector Xavier Monsegur, also known as Sabu, a former member of the hacking collectives Anonymous and LulzSec. Sabu gained notoriety in 2011 for leading a series of high-profile cyber-attacks…
Feb 28, 2023 | Articles, Write up
In this write-up, we will be focusing on broken access control vulnerabilities and providing multiple examples of how to detect them.