Analyzing an RFID scanner: bad habits never die
More than a year ago, BlackArrow’s Red Teamers conducted a security analysis of an RFID scanner used by one of its[...]
Red team & Threat hunting Blog - offensive security
More than a year ago, BlackArrow’s Red Teamers conducted a security analysis of an RFID scanner used by one of its[...]
The field of reverse engineering and specifically malware analysis within the Incident Response process is of vital impo[...]
When performing a penetration test, or a Red Team operation, multiple tools (webshells, proxysocks to tunnel TCP traffic[...]
Recently, our Red Teamers had to deal with a restricted scenario, where all traffic from the DMZ to the main network was[...]
Introduction to Kerberos delegation There are several kinds of delegation implemented by using the Kerberos protocol on [...]
During a Red Team operation, multiple vulnerabilities where discovered in Ampache, an open source web platform for audio[...]