Introduction In this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and, consequently, the entire network. We will introduce a newly discovered...
What is DLL? In Microsoft Windows, much of the functionality of both the operating system (OS) and third-party applications are provided by Dynamic Link Library (DLL) binaries. DLL files are Microsoft’s interpretation of the shared library concept. Instead of shipping...
Well we went and did it again. For the sixth time in a row TwelveSec is proud to be the Platinum Sponsors of Security BSides Athens. Since 2016 when the first Security BSides Athens, the event has been in the calendar of every Greek-based infosec enthusiast as the...
This Saturday the 20th Security BSides Athens 2020 is going to take place. This year, due to the health precautions the event evolved from a physical event to a virtual one on line. For those already attending well done, for the rest of you that you are thinking about...
Following the previous blogpost of this series regarding entry level resources for penetration testing, we are going to proceed with a list of referenced material focusing on web application penetration testing. Mainly, some handy Burp Extensions, resources for...
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.