Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Category: Active Directory

Red Team Finds A Way – Exploiting The Human Factor

July 2, 2024 Iulian Florea

What is Red Teaming? Red Teaming is a comprehensive approach that involves the use of various tactics, techniques, and procedures (TTPs) to simulate real-world threats.

Continue reading

Trench Tales: The College Account Takeover That Never Happened

October 16, 2023 Matei Josephs

A story of mass-discovery of LDAP Anonymous Binding leading to the account takeover of all members of a college. Explore the methodology, the challenges and the discoveries of this research project.

Continue reading

Bypassing Application Whitelisting

May 2, 2023 Iulian Florea

Application whitelisting is a very effective protection mechanism, but it can be difficult to manage and deploy at scale, and is not commonly deployed by

Continue reading

Active Directory – Delegation Based Attacks

May 16, 2022 Iulian Florea

What is Kerberos delegation? As stated by Microsoft, “delegation is one of the most important security features of Active Directory Domain Services. Delegation enables a

Continue reading

Top Posts

  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • Mobile Pentesting 101: How to Install Split APKs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • A Complete Kubernetes Config Review Methodology
  • Introduction to Windows shellcode development - Part 1

Blog Stats

  • 552,854 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar