Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

Hide Payloads in PDF Files using Cobalt Strike Beacons

Hide Payloads in PDF Files using Cobalt Strike Beacons

In this article, we’ll demonstrate how Cobalt Strike can be used to conceal communications within PDF files. Through examples, we depict embedding payloads directly into PDFs. Steganography techniques are explored, showcasing methods to embed beacons within PDFs’ metadata.

read more
Top 5 Casino Hacking Incidents

Top 5 Casino Hacking Incidents

Online safety at casinos is one of the most crucial elements of gambling. We are currently witnessing ​​global hack revolution gambling. So to learn from the lessons of the past, today we are counting the top five notable hacker attacks on online casinos, and what we have learned.

read more
Penetration Testing 101: How To Utilize Proxies For Enhanced Privacy

Penetration Testing 101: How To Utilize Proxies For Enhanced Privacy

In the intricate landscape of cybersecurity, penetration testing emerges as a critical practice, serving as a proactive measure to unearth vulnerabilities in systems before malicious actors do. This ethical hacking process not only underscores the commitment to digital fortification but also navigates a complex web of ethical and legal considerations, ensuring that all activities are sanctioned and intended to bolster security.

read more
10 Misconceptions about Hacking

10 Misconceptions about Hacking

In this article, we’ll discuss about ten common misconceptions surrounding hacking, gaining insights into the diverse and nuanced nature of this field.

read more
Understanding PTaaS and SOC

Understanding PTaaS and SOC

In this article, we’ll showcase the differences between Penetration Testing as a Service (PTaaS) and Security Operations Centers (SOCs) by comparing them and explain which one can be the more effective overall solution for organizations to protect their infrastructure.

read more
Analyzing Microsoft’s NBNS and BOOTP Protocols with Wireshark for Red Teaming

Analyzing Microsoft’s NBNS and BOOTP Protocols with Wireshark for Red Teaming

In this article, we’ll dive into the functionalities of Wireshark, a powerful network protocol analyzer for network packet sniffing. We’ll focus on two key services: Microsoft’s NBNS (NetBIOS Name Service) and BOOTP (Bootstrap Protocol). We’ll show you how you can use them when you perform your Red Team engagements, particularly for Internal Pentesting or Local Network enumeration techniques, taking advantage of such vulnerable components by design that can be forgotten.

read more
Can an Amazon Fire Stick be Hacked?

Can an Amazon Fire Stick be Hacked?

With its vast entertainment library, the Fire Stick has become a household favorite. But just like any connected device, it faces potential security risks. This article explores these vulnerabilities and outlines essential steps. It will help you safeguard your Fire Stick and secure your streaming experience.

read more
Major Cyber Attacks that shaped 2023

Major Cyber Attacks that shaped 2023

In this article, we’ll dive into the major cyberattacks that shaped 2023, exploring a domain marked by a surge in both the frequency and sophistication of cyber threats. The year witnessed an escalation in the exploitation of vulnerabilities, with ransomware, phishing, and supply chain attacks emerging as predominant vectors. Notable incidents include breaches at T-Mobile, a supply chain compromise affecting 3CX software, and a zero-day vulnerability exploited in MOVEit Transfer.

read more