Depending on the customer’s preference, possible initial access vectors in our red teaming exercises typically include deployment of dropboxes,…

Lire la suite

TL;DR: PowerShell tool to enumerate Entra ID objects, assignments and identify highly privileged objects or risky configurations.…

Lire la suite

As a pentester you are sometimes thrown into projects where you have no idea where you are going to end up. This project was one of those where you…

Lire la suite

Red Team Operator. A hype-tagged role tag for which one question hits our corporate LinkedIn inbox very often. “Hey there, how can I become a Red Team…

Lire la suite

In the previous posts of this series, we looked at different ways to bypass web filters, such as Host header spoofing and domain fronting. As we’ve…

Lire la suite