deep

deep

TIBER Red Team – A Story

TIBER Red Team – A Story Our TIBER red team was engaged by a large financial institution to conduct a simulated cyber attack against their systems. The goal of the engagement was to identify and prioritize vulnerabilities in the organization’s…

Practical Impacket

Practical Impacket This blog post document practical uses of impacket’s scripts that we have used in engagements, exams and during research. Impacket () is a brilliant collection of python scripts developed by SecureAuth used to work with network protocols and…

The Powershell Double Hop

The Powershell Double Hop This post details overcoming the infamous double hop problem that exists in powershell. Once you have established a powershell remoting session on one computer, you are mostly limited to activity on that computer. From that session,…

Tunnel traffic through SSH connection

A lot of times you may be able to get SSH access to a host at target’s network perimeter and want to scan their internal environments. It is possible to use the magic of SSH to tunnel your traffic through…