Our Blog

Constrained Delegation Considerations for Lateral Movement

Reading time: ~17 min
The abuse of constrained delegation configuration, whereby a compromised domain user or computer account configured with constrained delegation can be...

Left To My Own Devices – Fast NTCracking in Rust

Reading time: ~17 min
When I got a new MacBook with an M1 Pro chip, I was excited to see the performance benefits. The...

SIM Hijacking

Reading time: ~37 min
Introduction “533 million Facebook users’ phone numbers leaked” was one of the highlighted titles that flooded many social networks’ pages....