So You Want to Be a Hacker: 2023 Edition

So You Want to Be a Hacker: 2023 Edition

Video Version: Introduction The past two years, we’ve posted blogs on how to become an ethical hacker. Given that these blogs have been well received, we have brought back yet another edition. So, without further ado, let’s chat about how you can break...
Security Teams Need to Think Like Pentesters

Security Teams Need to Think Like Pentesters

We conduct a wide variety of assessments for a wide range of clients. We provide assessment services for universities, health care companies, law firms, telecommunication providers, and many more. Some of our clients have mature infrastructures, while others are still...
Follina RCE Exploitation – CVE-2022-30190

Follina RCE Exploitation – CVE-2022-30190

Introduction It was reported on May 30th by Microsoft that the Microsoft Support Diagnostic Tool (MSDT) was being actively exploited to obtain RCE on systems. The vulnerability, which can be executed through malicious Office documents, can be used to access remote...
Internal Persistence Techniques

Internal Persistence Techniques

The majority of our internal penetration tests are at least a week long. While we generally have a drop box sent to the client to enable our access to the network, we have to consider efficiency as well. Ensuring persistent access in a network is vital to that...