Real Life Pentest Scenarios #1 – Shortest Way To Domain Admin

I would like to share an incident that I encountered years ago, in a penetration testing project which can give a very good idea about how inconsistent the security maturity and self-confidence of institutions can be. I would also like to remind you that dozens of such events encountered every year. Target: International OrganizationAccess Point: […]

Real Life Pentest Scenarios #1 – Shortest Way To Domain Admin Read More »

Hacking With Automation

Creating a smart scanner and hacking even the biggest organizations without touching the keyboard? So easy! Sia Back in 2018, I decided to create a simple program to do the basic enumeration. Because, while pentesting with a big scope, these kind of automation tools are saving more time to focus on targets and test them

Hacking With Automation Read More »

What is Red Team?

In this article, we will talk about one of the most popular concepts of cyber security, “Red Team”. But before that, we need to know what is penetration testing and why we need penetration tests. Penetration testing Penetration testing is a simulated attack, performed by qualified persons in this field, legally and in accordance with

What is Red Team? Read More »

What is ‘Hacking’?

First of all, we have to realize that the word ‘hacker’ has nothing to do with piracy or theft. The unauthorized use of a right by a person is called piracy, and the taking of a property without the right to do it called theft; whether this is done by technological or physical ways, it

What is ‘Hacking’? Read More »