Firewall

PowerShell Commands for Pentesters

PowerShell commands for pentesters logo

This article contains a list of PowerShell commands collected from various corners of the Internet which could be helpful during penetration tests or red team exercises. The list includes various post-exploitation one-liners in pure PowerShell without requiring any offensive (= potentially flagged as malicious) 3rd party modules, but also a bunch of handy administrative commands. […]

PowerShell Commands for Pentesters Read More »

Security Operations Center: Challenges of SOC Teams

Fundamental weaknesses of a SOC (Security Operations Center) logo

Let me ask you a question: If big corporations, businesses and organizations around the world have SOC (Security Operations Center) monitoring their networks 24/7/365, how is it possible that data breaches still happen? How is it possible that adversaries (APT groups, cyber criminals etc.) break their perimeter and exploit weaknesses in their networks, undetected? In

Security Operations Center: Challenges of SOC Teams Read More »

Top 20 Microsoft Azure Vulnerabilities and Misconfigurations

Microsoft Azure cloud top 20 vulnerabilities and misconfigurations logo

In this article, we will look on the top 20 vulnerabilities and misconfigurations of the Microsoft Azure cloud that are commonly found during credentialed security audits and architecture reviews. Information in this post can hopefully aid security architects, auditors and other professionals in assessment of the security posture of a given Azure cloud environment. Introduction

Top 20 Microsoft Azure Vulnerabilities and Misconfigurations Read More »