Skip to content

Continuous Automated Red Teaming (CART)

Google Dorking for Continuous Attack Surface Management

Google Dorking, also known as Google hacking, is a technique where advanced search operators are used to find specific information on search engines. It involves crafting search queries to discover vulnerable or exposed data on the internet. Attack surface management involves identifying and securing all possible entry points into an organization’s systems and networks. It… Read More »Google Dorking for Continuous Attack Surface Management

The Art of Keytab Files

A keytab file is a file containing pairs of Kerberos principals and encrypted keys. These files are used to authenticate a principal on a network. Kerberos is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Brief Overview of Keytab Files… Read More »The Art of Keytab Files

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Race conditions, a critical vulnerability, arise when multiple processes or threads execute concurrently within a software system. This blog aims to provide a comprehensive understanding of race conditions and effective prevention strategies, accompanied by practical examples. Misconception – Is it commonly believed that Race Condition Bugs primarily result in Denial of Service (DoS)? Contrary to… Read More »Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Unveiling SSL / TLS Vulnerabilities: A Red Teamer's Guide to Exploiting Weaknesses with SSLScan and TestSSL

Unveiling SSL/TLS Vulnerabilities: A Red Teamer’s Guide To Exploiting Weaknesses With SSLScan And TestSSL

SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are cryptographic protocols that ensure secure communication over the internet. They provide data encryption, authentication, and integrity verification to protect sensitive information transmitted between a user’s web browser and a website, or between servers. This security is crucial for online transactions, sensitive data exchange,… Read More »Unveiling SSL/TLS Vulnerabilities: A Red Teamer’s Guide To Exploiting Weaknesses With SSLScan And TestSSL