Assumed Breach: Objectives, Methodology, Test Scenarios and Use Cases At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer ... 30.12 Applications
What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
Azure Penetration Testing: Objectives, Methodology and Use Cases Like other cloud services, Azure is a prime target for attackers. This is due to its growing popularity and strategic importance for businesses. To re... 08.11 Cloud
What is a Man in the Middle (MiTM) Attack? Types and Security Best Practices Man in the Middle (MitM) attacks exploit network configuration flaws and the absence of robust security mechanisms to guarantee the integrity and conf... 07.11 Infra & Network
What is a Race Condition? Exploitations and Security Best Practices With a good Internet connection and high-performance hardware, users can have the impression that their actions on a web page are instantaneous or alm... 30.10 Applications
Subdomain Enumeration Techniques and Tools Various subdomain enumeration techniques are used to identify the attack surface of a domain or organisation.The aim is to obtain as complete a list a... 09.10 Applications
What is Kerberos? Kerberos Authentication Explained Kerberos is an authentication protocol used in a Microsoft Active Directory context. The lack of knowledge about how it works can lead to the introduc... 08.10 Infra & Network
Cloudflare: How to Secure Your Origin Server? Cloudflare has established itself as a key player on the web in recent years, offering not only CDN services, but also protection against various atta... 08.10 Applications