News

NETWORKER

One more way to own Networker

In our pentest exercise, we found many installations of Networker Client in the internal Network. Some of these installations allowed us to execute Networker commands remotely, so we tried to exploit the command injection vulnerability in “nsrdump”

Read
Opinion Note:

May the Cybersecurity Community Keep Growing!

Historically, I always closed the year talking about trends, best practices or new technologies. This year I came across different reflections. Product of age, fatigue or the pandemic..

Read
Identity and Access Management:

Why do organizations need it?

In recent years much has been written about securing the identity, accesses and allowed activities for each user on every enterprise asset, be it application, mobile device, network, on-premise or cloud infrastructure, databases, routers, etc.

Read
MITRE Engage:

The best defense is a good offense.

In traditional cyber defense, the attacker only needs to get it right once to win, but with new defensive approaches, the attacker only needs to get it wrong once to lose.

READ
Training without getting bored:

Gamification of training

The cybersecurity market continues to grow steadily. Practically every week there are new cases of data leakage, companies attacked by ransomware, and new TTPs (Tactics, Techniques and Procedures)

READ

DNS Tunneling

Surely at some time you were in an airport, a cafe, an airplane or a hotel where therewas a WiFi network that did not require a password to connect, but at the time of browsing it asked for a subscription or some kind of payment, deriving your navigation to what is known as a captive portal.

READ

TTX Simulation Exercises (I)

A tabletop simulation exercise consists of a collaborative activity that allows experimenting how to react to a cybersecurity incident, both in the technical and executive aspects.

READ

TTX Simulation Exercises (II)

In the first part we discussed the basics of desktop simulation exercises for incident response practice, and detailed the main issues that need to be decided in order to carry out an exercise.

READ

The great (incident response) simulator

oftware for incident response simulation exercises is not so common in the market. Not so much because of its complexity with respect to other types of software..

READ

Honeypots: traps for the adversary

Every day, companies receive hundreds or thousands of automated attacks in search of potential new victims. Thousands of bots, scrappers..

READ
Stirring the honeycomb:

Analysis of the test honeypot

A month after the creation of our honeypot from scratch, designed to analyse the attackers, their goals, patterns and actions, we will see what it managed to capture, what were the most targeted services..

Read
Beaconing:

Tracking attackers

Periodically new attacks emerge on companies trying to collect sensitive information, or some important data. What any cyber-attacker is looking for is to take something that is linked to their target..

READ