TARLOGIC's BLOG
Cybersecurity - Page 9
Cybersecurity articles with security analysis and ethical hacking technics information
Kerberos (III): How does delegation work?
Introduction to Kerberos delegation There are several kinds of delegation implemented by using the Kerberos protocol on Windows and Linux servers. Basically, delegation allows a se[...]
Read moreSmart Meters – Threats and Attacks to PRIME Meters
A golden rule in the world of cybersecurity is that the system risk is greater than the aggregate risk of its component elements. This is because, as the number of vulnerable eleme[...]
Read moreSmart Meters – The Spanish Scenario and the Telemanagement System
Smart meters have become a reality in recent years not only in new housing, but also in older buildings where—by legal requirement—they have had to renew their measuring device[...]
Read moreVulnerabilities in Ampache (<=3.9.1)
During a Red Team operation, multiple vulnerabilities where discovered in Ampache, an open source web platform for audio/video streaming. CVE codes have been assigned for two of th[...]
Read moreZeroShell Vulnerability – CVE-2019-12725
Product: ZeroShell Publication Date: 17/07/2019 Author: Juan Manuel Fernandez (@TheXC3LL) – Tarlogic Zeroshell vulnerability – CVE-2019-12725 RCE as root The latest ver[...]
Read moreAttacking QA platforms: Selenium Grid
During the course of a Red Team exercise serveral QA assets where discovered. In particular the usage of the Selenium Grid platform without authentication caught the team’s a[...]
Read more