News
Understanding ADCS 101
In this publication we will be discussing the basic aspects of ADCS, as well as the ESC1 exploitation technique. Introduction to ADCS Active Directory Certificate Services (ADCS) is a role...
Understanding ADCS 101
In this publication we will be discussing the basic aspects of ADCS, as well as the ESC1 exploitation technique. Introduction to ADCS Active Directory Certificate Services (ADCS) is a role...
CVE-2024-28995 – SolarWinds Serv-U Path Traversal
Continuing with the saga of the CVEs of this 2024, today we have CVE-2024-28995. The SolarWinds IT management platform reported a vulnerability in its server on June 5...
CVE-2024-28995 – SolarWinds Serv-U Path Traversal
Continuing with the saga of the CVEs of this 2024, today we have CVE-2024-28995. The SolarWinds IT management platform reported a vulnerability in its server on June 5...
Alternatives to BurpSuite - Caido Web Proxy
When carrying out web audits we always tend to think of BurpSuite, which is the tool par excellence, but have you ever thought about other alternatives? We know that if...
Alternatives to BurpSuite - Caido Web Proxy
When carrying out web audits we always tend to think of BurpSuite, which is the tool par excellence, but have you ever thought about other alternatives? We know that if...
The European Supervisory Authorities (ESA) have...
On December 27, 2022, two different, but closely linked, regulations related to cybersecurity were published in the Official Journal of the European Union. They came into force 20 days...
The European Supervisory Authorities (ESA) have...
On December 27, 2022, two different, but closely linked, regulations related to cybersecurity were published in the Official Journal of the European Union. They came into force 20 days...
NTLMv1 Downgrade attack
NetNTLMv1 downgrade As we have commented in previous posts, after forcing authentication and obtaining the NetNTLM hash of the password of the victim's machine user, we are mainly presented with...
NTLMv1 Downgrade attack
NetNTLMv1 downgrade As we have commented in previous posts, after forcing authentication and obtaining the NetNTLM hash of the password of the victim's machine user, we are mainly presented with...
Why have half the world's services fallen after...
Today, July 19, 2024, many companies globally have encountered the well-known "Blue Screen of Death" (BSOD) in their systems. This failure has forced many companies to discontinue their...
Why have half the world's services fallen after...
Today, July 19, 2024, many companies globally have encountered the well-known "Blue Screen of Death" (BSOD) in their systems. This failure has forced many companies to discontinue their...





