What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
What is a Man in the Middle (MiTM) Attack? Types and Security Best Practices Man in the Middle (MitM) attacks exploit network configuration flaws and the absence of robust security mechanisms to guarantee the integrity and conf... 07.11 Infra & Network
What is Kerberos? Kerberos Authentication Explained Kerberos is an authentication protocol used in a Microsoft Active Directory context. The lack of knowledge about how it works can lead to the introduc... 08.10 Infra & Network
Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
Understanding NTLM Authentication and NTLM Relay Attacks In an office environment, user workstations generally use Windows operating systems and therefore authenticate using protocols developed by Microsoft.... 08.07 Infra & Network
Black Box Penetration Testing: Objective, Methodology and Use Cases During a penetration test, we generally consider 3 test conditions: black, grey or white box. These test conditions correspond to the levels of inform... 11.03 Applications
White Box Penetration Testing: Objectives, Methodology and Use Cases When pentesting a web application, an API or an internal network, there are generally 3 approaches: black box, grey box and white box testing. These a... 29.02 Applications
Antivirus and EDR Bypass Techniques Antivirus, anti-malware and EDR are tools commonly used to prevent attacks. However, these solutions can be bypassed. In this article, we take a close... 23.02 Applications
Penetration Testing: Methodology, Scope and Types of Pentests With cybersecurity risks on the rise, it is becoming more and more obvious to carry out a penetration test (pentest) to reassure customers, partners a... 05.02 Applications
Internal Penetration Testing: Objective, Methodology, Black Box and Grey Box Tests Faced with an ever-increasing number of internal attacks, network infrastructure security is a key factor in ensuring the confidentiality and integrit... 18.08 Infra & Network