Network devices

Security Operations Center: Challenges of SOC Teams

Fundamental weaknesses of a SOC (Security Operations Center) logo

Let me ask you a question: If big corporations, businesses and organizations around the world have SOC (Security Operations Center) monitoring their networks 24/7/365, how is it possible that data breaches still happen? How is it possible that adversaries (APT groups, cyber criminals etc.) break their perimeter and exploit weaknesses in their networks, undetected? In

Security Operations Center: Challenges of SOC Teams Read More »

Reveal Passwords from Administrative Interfaces

Unhide passwords stored in administrative interfaces

During penetration tests, attackers often times gain access to various administrative interfaces and management consoles. These interfaces can consequently contain credentials for other systems in the network, as they are integrated together. Credentials are of course very valuable for every penetration tester, however they are typically hidden under dots and cannot be just simply copied.

Reveal Passwords from Administrative Interfaces Read More »