In our previous post, Red Team Finds A Way – Exploiting The Human Factor, we explored how the human element can often be the weakest
Category: Misc
Red Team Finds A Way – Exploiting The Human Factor
What is Red Teaming? Red Teaming is a comprehensive approach that involves the use of various tactics, techniques, and procedures (TTPs) to simulate real-world threats.
CVE-2024-28344 & CVE-2024-28345 in Sipwise C5
Updates The vulnerabilities are also present on the latest version of Sipwise C5 mr12.2.1. CVE-2024-28344 – Open Redirect An Open Redirect vulnerability was found in
Passing Your OSCP In 2023 (or 2024)
I am aware that the internet is full of videos, blog and forum posts, GitHub pages (and the list goes on) about the OffSec Certified
Command and Control Frameworks: Metasploit and Havoc
1. Overview In this blog post we will be talking about Command and Control (C&C or C2) Servers and Metasploit’s and Havoc’s role in a
Introduction to AI Prompt Injections (Jailbreak CTFs)
The world of AI is developing pretty fast and new tools and plugins that leverage the power of LLMs (Large Language Models) are being developed