Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Author: Iulian Florea

Red Team Finds A Way – (IN)Secure By Design

September 11, 2024 Iulian Florea

In our previous post, Red Team Finds A Way – Exploiting The Human Factor, we explored how the human element can often be the weakest

Continue reading

Red Team Finds A Way – Exploiting The Human Factor

July 2, 2024 Iulian Florea

What is Red Teaming? Red Teaming is a comprehensive approach that involves the use of various tactics, techniques, and procedures (TTPs) to simulate real-world threats.

Continue reading

Bypassing Application Whitelisting

May 2, 2023 Iulian Florea

Application whitelisting is a very effective protection mechanism, but it can be difficult to manage and deploy at scale, and is not commonly deployed by

Continue reading

Active Directory – Delegation Based Attacks

May 16, 2022 Iulian Florea

What is Kerberos delegation? As stated by Microsoft, “delegation is one of the most important security features of Active Directory Domain Services. Delegation enables a

Continue reading

Gone Phishing – Part #1

March 24, 2022 Iulian Florea

The term “social engineering” refers to a wide range of malicious activities carried out through human interactions.It employs psychological manipulation to dupe users into making

Continue reading

Top Posts

  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • Mobile Pentesting 101: How to Install Split APKs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • Introduction to Windows shellcode development - Part 1
  • A Complete Kubernetes Config Review Methodology

Blog Stats

  • 552,921 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar