Category: Uncategorized

  • Blog
  • Category: Uncategorized
Bypassing Defender the Easy Way – FodHelper

Bypassing Defender the Easy Way – FodHelper

If you’ve ever tried to run a command prompt as administrator on your Windows OS before, you’ve seen a harmless popup appear. This is Windows User Account Control, or UAC. According to Microsoft, UAC “is a fundamental component of Microsoft’s overall security vision. UAC helps mitigate the impact of malware.” (How User Account Control Works)

Read More
Pentest Tales #002: Digging Deep​

Pentest Tales #002: Digging Deep​

Pentest Tales #002: Digging Deep Welcome to the second edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.  The purpose of this blog is not just to share the “owning” of a domain, but to provide education as to why a domain was owned in the first

Read More
SMB Relay Attacks – Gift That Keeps on Giving

SMB Relay Attacks – Gift That Keeps on Giving

With all of the new Microsoft vulnerabilities features being exploited lately, it’s important to consider some of the vulnerabilities that have truly withstood the test of time. Flavor of the Month vulnerabilities like PrinterNightmare and attacking Active Directory Certificate Services may seem incredible currently (and they are), but they end up being manually patched out

Read More
Kerberoasting Domain Accounts

Kerberoasting Domain Accounts

The Gift That Keeps on Giving Few vulnerabilities in the Windows Active Directory environment have had the long-lasting impact that Service Principal Names (SPN) have.  Domain-connected services, such as MSSQL servers, web servers, and more may be connected and issued identifiers that allow Kerberos to authenticate the service account.  If a domain user account is

Read More
ASREP Roasting & Pre-Authentication in AD Environments

ASREP Roasting & Pre-Authentication in AD Environments

Any Systems Administrator knows that the task of securing an Active Directory environment is a never-ending task.  Since the first Windows AD was released with Server 2000, Microsoft has added countless features.  Many of these features are created with connectivity in mind, and some are there to bypass security features to allow accessibility with incompatible

Read More
Boost Your Security Program for WFH Employees

Boost Your Security Program for WFH Employees

With communities beginning to open back up, companies are considering the decision to stay remote.  And this comes with good reasons.  The cost of leasing space might be prohibitive and downsizing to host only necessary business functions could help with expenses.  During the pandemic, your organization may have seen an increase in productivity and employee

Read More
Pentest Tales #001: You Spent How Much on Security?

Pentest Tales #001: You Spent How Much on Security?

Pentest Tales #001: You Spent How Much on security? Welcome to the first edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.  The purpose of this blog is not just to share the “owning” of a domain, but to provide education as to why a domain was

Read More