Network Security

Security Operations Center: Challenges of SOC Teams

Fundamental weaknesses of a SOC (Security Operations Center) logo

Let me ask you a question: If big corporations, businesses and organizations around the world have SOC (Security Operations Center) monitoring their networks 24/7/365, how is it possible that data breaches still happen? How is it possible that adversaries (APT groups, cyber criminals etc.) break their perimeter and exploit weaknesses in their networks, undetected? In

Security Operations Center: Challenges of SOC Teams Read More »

Port Scanner in PowerShell (TCP/UDP)

Minimalistic TCP and UDP portscanner logo

Introducing another addition to our portfolio of minimalistic tools for pentesting. This time we are going to be looking on a minimalistic TCP and UDP port scanner. Written in pure PowerShell, this small yet powerful port scanner is useful in specific attack simulations where we cannot use any traditional or typical port scanners. Introduction There

Port Scanner in PowerShell (TCP/UDP) Read More »