Device code phishing is nothing new. In fact it has been around for some years now. Despite the awesome capabilities of device code phishing, it is…

Read more

Readers of this blog probably know that I like to try NTLM relaying over all protocols possible! Relaying to Microsoft SQL (MSSQL) is known to work…

Read more

Internet of Things (IoT) and Operational Technology (OT) is an area that has grown strongly in recent years and is increasingly being used in the…

Read more

Nowadays, web developers rely mostly on well-established frameworks to develop their platform or web sites. These frameworks take care of many…

Read more

A journey into the discovery of privilege escalation vulnerabilities in the Lenovo Update process.

Read more