by Aristotelis Koureleas | Jul 24, 2024 | 
Introduction In this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and, consequently, the entire network. We will introduce a newly discovered...				
					
			
					
											
								
							
					
															
					
					 by George Roumeliotis | Feb 2, 2024 | 
During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability, identified in versions 1.3 to 1.9, 1.10.0 to 1.10.29, and 1.11.0 to 1.11.8,...				
					
			
					
											
								
							
					
															
					
					 by Andrei Grigoras | Nov 22, 2023 | 
Modern Challenges and Solutions Part 1: Defenses Against Phishing Attacks Phishing attacks, one of the oldest types of cyber threats, have become more sophisticated and diverse. This evolution is due, in part, to advancements in cyber-defense technologies and...				
					
			
					
											
								
							
					
															
					
					 by Xenofon Vassilakopoulos | Oct 10, 2023 | 
Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...				
					
			
					
											
								
							
					
															
					
					 by Xenofon Vassilakopoulos | Sep 27, 2023 | 
Introduction In this blog post we will discuss the use of Corellium emulator in Penetration Testing engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection using frida and r2frida, a plugin for radare2 that allows to instrument...