Skip to content

Continuous Automated Red Teaming (CART)

Understanding SNMP Enumeration

SNMP (Simple Network Management Protocol) is a widely used protocol for managing and monitoring network devices. SNMP enumeration is a crucial step in understanding the configuration and health of a network. In this blog post, we’ll explore the fundamentals of SNMP enumeration, and its importance, and provide practical examples to… Read More »Understanding SNMP Enumeration

2023 Trends in Phishing Techniques: What to Watch Out For

Phishing, a deceptive technique used by cybercriminals, involves tricking individuals into disclosing sensitive information such as passwords, credit card numbers, or personal data. Initially, phishing predominantly relied on unsophisticated emails mimicking legitimate entities. However, it has evolved into a multifaceted threat encompassing various mediums and advanced social engineering tactics.Think of… Read More »2023 Trends in Phishing Techniques: What to Watch Out For

Importance of GitHub Reconnaissance in CASM & CART

GitHub reconnaissance is an important aspect of attack surface management, particularly for organizations and individuals who rely heavily on software development and open-source code. Here’s why it is crucial: Discovery of Sensitive Information Developers sometimes inadvertently push sensitive information e.g. hardcoded credentials, API keys, access tokens and Configuration Files containing… Read More »Importance of GitHub Reconnaissance in CASM & CART