Red TeamingMarch 2025
Advanced Active Directory Attacks: Beyond the Basics
A deep-dive into modern Active Directory attack chains that go beyond Kerberoasting — covering ACL abuse, constrained delegation attacks, cross-forest trust exploitation, and RBCD techniques that bypass traditional defences.
Active DirectoryKerberosRed TeamMITRE ATT&CK
Read Article →
Cloud SecurityFebruary 2025
AWS IAM Privilege Escalation: 20 Paths You Might Be Missing
Analysis of twenty distinct IAM privilege escalation vectors observed during real-world cloud assessments in 2024, including novel paths through Lambda execution roles, OIDC federation, and cross-service confusion attacks.
AWSIAMCloud SecurityCSPM
Read Article →
MaritimeJanuary 2025
ECDIS Security: The Navigational System Nobody Is Patching
Electronic Chart Display and Information Systems have become critical navigation infrastructure on modern vessels — yet most run outdated operating systems, accept USB media without scanning, and connect directly to ship management networks. An assessment of the real attack surface.
ECDISMaritimeOTIMO
Read Article →
OT/ICSDecember 2024
ICS Protocol Security: Modbus, DNP3, and IEC 61850 Under Attack
Industrial protocols were designed for reliability, not security. This research documents real attack scenarios against Modbus TCP, DNP3, and IEC 61850-based substations — including packet crafting techniques and the devastating potential of unauthenticated command injection.
ICSSCADAModbusDNP3
Read Article →
Red TeamingNovember 2024
Physical Penetration Testing: A Practitioner’s Field Guide
Physical security testing is often overlooked in favour of digital assessments — but a tailgating attempt or USB drop can bypass million-dollar security stacks. This guide covers reconnaissance, bypass techniques, and reporting for physical engagements.
Physical SecurityRed TeamSocial Engineering
Read Article →
Cloud SecurityOctober 2024
Serverless Security: Attacking and Defending Lambda Functions
Lambda functions are deceptively complex attack surfaces. This research covers event injection, execution role abuse, layer supply chain attacks, and the emerging threat of cross-function data leakage through shared execution environments.
ServerlessLambdaAWSFunction Security
Read Article →