AWS Penetration Testing: Objectives, Methodology and Use Cases AWS is a prime target for attackers. Its growing popularity and strategic role make it an attractive service. To limit the risks, it is crucial to put... 07.01 Cloud
What is Buffer Overflow? Attacks, Types and Security Tips Buffer overflow is one of the oldest and most exploited vulnerabilities. Despite this long history, they remain a major threat today. Whether on serve... 06.01 Applications
Active Directory Pentesting: Objective, Methodology, Black Box and Grey Box Tests Active Directory (AD) is at the heart of many organisations’ IT infrastructure. It manages authentication, authorisation and access to critical ... 02.01 Infra & Network
Assumed Breach: Objectives, Methodology, Test Scenarios and Use Cases At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer ... 30.12 Applications
What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
Azure Penetration Testing: Objectives, Methodology and Use Cases Like other cloud services, Azure is a prime target for attackers. This is due to its growing popularity and strategic importance for businesses. To re... 08.11 Cloud
What is a Man in the Middle (MiTM) Attack? Types and Security Best Practices Man in the Middle (MitM) attacks exploit network configuration flaws and the absence of robust security mechanisms to guarantee the integrity and conf... 07.11 Infra & Network
What is a Race Condition? Exploitations and Security Best Practices With a good Internet connection and high-performance hardware, users can have the impression that their actions on a web page are instantaneous or alm... 30.10 Applications