Skip to content

Red Teaming

The Art of Keytab Files

A keytab file is a file containing pairs of Kerberos principals and encrypted keys. These files are used to authenticate a principal on a network. Kerberos is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Brief Overview of Keytab Files… Read More »The Art of Keytab Files

How do attackers utilize .git

How Do Attackers Utilize .git For Fun And Profit?

Security teams are busy fixing CVEs, SQLi, and other critical vulnerabilities. However, exposing .git can potentially leak credentials, source code and other sensitive information. In this blog, we will uncover the dangers of hidden exposed .git, and how to identify and mitigate the relevant risk. Introduction In the realm of software development, Git stands as… Read More »How Do Attackers Utilize .git For Fun And Profit?

Uncovering The Robots.txt Role In Cybersecurity

In the ever-changing realm of cybersecurity, it’s the small details that often matter the most. The robots.txt file, while seemingly insignificant, is a crucial component that can fortify a website’s security. We will explore robots.txt in-depth, delving into its functions, and uncovering its role in Cyber Security. Robots.txt: A Closer Look Robots.txt, short for “Robots… Read More »Uncovering The Robots.txt Role In Cybersecurity

Top 25 Tools For Red Teaming

Top 25 Tools For Red Teaming

What is Red teaming? Red teaming is a valuable technique that can help you to identify and mitigating security vulnerabilities in your organization’s attack surface by simulating real-world attacks. Organizations use hundreds of tools to conduct traditional or manual red teaming activities in different combinations. Here are top 25 most common tools used by Red… Read More »Top 25 Tools For Red Teaming

Top 12 Talks On ‘Red Teaming & Purple Teaming’ from Security Conferences

1. Red Team vs. Blue Team on AWS 2. Red Team View: Gaps in the Serverless Application Attack Surface 3. Establishing a Quality Vulnerability Management Program 4. DevSecOps on the Offense: Automating Amazon Web Services Account Takeover 5. Security Precognition: Chaos Engineering in Incident Response 6. Breaking and Entering: How and Why DHS Conducts Penetration… Read More »Top 12 Talks On ‘Red Teaming & Purple Teaming’ from Security Conferences