HOW SAFE IS YOUR DATA?
// OUR SERVICES
// LATEST NEWS
On a recent engagement we faced a difficult target with minimal external attack surface. Their website had a few flaws, but it was hosted externally with a third party. Even if we could compromise the site, it likely wouldn't result in the internal network access we...read more
It's no secret that we're big fans of the Metasploit Framework for red-team operations. Every now and again, we come across a unique problem and think "Wouldn't it be great if Metasploit could do X?" Often, after some investigation, it turns out that it is...read more
During red team engagements, we've found ourselves in the situation of wanting to use multiple remote access tools (Metasploit, Empire, Cobalt Strike, etc), all over port 443 for HTTPS communications. This is common when the only egress method from a network is...read more