
Lateral movement via MSSQL: a tale of CLR and socket reuse
Recently, our Red Team had to deal with a restricted scenario, where all traffic from the DMZ to the main network was bl[...]
Red team & Threat hunting Blog
Recently, our Red Team had to deal with a restricted scenario, where all traffic from the DMZ to the main network was bl[...]
Introduction to Kerberos delegation There are several kinds of delegation implemented by using the Kerberos protocol on [...]
One of the activities included in the operation of the Tarlogic Red Team is the search for vulnerabilities in the softwa[...]
Introduction In a Red Team operation, a perimeter asset vulnerable to SQL Injection was identified. Through this vulnera[...]