Rajeev RanjanENUMERATION IN ACTIVE DIRECTORYFirst, we must have time control over the tests we run in our pen testing and red team operations.Aug 3Aug 3
Rajeev RanjanPossible Phishing Attack1. Bait: The attacker typically imitates well-known companies or services to create a message or webpage that appears natural. They could…Sep 17, 20231Sep 17, 20231
Rajeev RanjanProtecting against Cobalt StrikePreventative and Threat Hunting MethodologyMay 9, 2023May 9, 2023
Rajeev RanjanAttacked From Behind ApplicationAdversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in…Mar 5, 2023Mar 5, 2023
Rajeev RanjanMFA Bypass Techniques: How Does it Work?Identification and authentication are the first phases of verification in the login processes of Information Systems. Malicious threat…Feb 11, 2023Feb 11, 2023
Rajeev RanjanPhishing, Smishing, and VishingHow do these cyber attacks work and how to prevent them?Feb 10, 20232Feb 10, 20232