Shh! Weaknesses In Remote Management Protocols

Estimated difficulty:Β  πŸ’œπŸ€πŸ€πŸ€πŸ€ Recently I was studying for CRT. To help myself and others revise, I thought I would make this blog post on management protocols and some of their common weaknesses and vulnerabilities. This is a high-level overview of some of these protocols and how to exploit them. We Continue Reading

Locked Out: What is Ransomware?

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€ Ransomware can be a costly attack to organisations of all sizes. Recently Garmin fell victim to a ransomware attack, with reported ransoms of up to US$10 million in exchange to reinstate company files. According to a The State of Ransomware 2020 by Sophos, the global average cost Continue Reading

You Shall Not Pass: Authentication 101

Estimated difficulty: πŸ’œπŸ’œπŸ€πŸ€πŸ€ Authentication. A familiar “buzzword” we see that is parroted in all things security, a selling point for many vendors, and a well-known term written (quite a lot) by pen-testers in their final reports. But what exactly is authentication? Well, in reality authentication is a complex and sizeable Continue Reading