May you live in interesting times! Using WPA2 apparently is not a good idea anymore. This caught my interest as it is a breach on a protocol level rather than just a function and there are many companies that have moved to WIFI and rely of WPA2-Enterprise to secure the communication. So many WIFI units […]
Read Full Post »
One of the best things with working at Microsoft is all the things you get to know and one of the worst things is all the things you are not allowed to tell (yet). Still I took a look at Credential Guard today to understand how it works and I found this document that describes […]
Read Full Post »
If you are a pentester you a perfectly aware of lateral movement but if you are a bit more far away from technology you probably won’t read any more right now but I would advice you to continue reading. What is lateral movement? It’s the process of getting access to a computer, capture the credentials […]
Read Full Post »
Posted in Technology on Jun 10th, 2017
I´m not to fond of not manage to help my clients recover but sometimes shit happens and you´ll have to just stand there looking at a disaster evolving in front of your eyes. This particular case was in April. I was recovering from a surgery so I wasn´t working. My phone rang and a friend […]
Read Full Post »
Following on the administrator is the DBA, a person that is almost mythical as it´s a very scarce resource. During my years as a DBA I always had full access to everything within the database and as many databases was run under domain admin accounts I could do anything in the environment that I wanted. […]
Read Full Post »
Posted in Technology on Jul 21st, 2016
A CIO at an industry here in Sweden dropped me a mail and told me how they received their reporting. On a monthly basis they get a list of possible patches to deploy, from that list they have to select what to patch and what to not patch. This raises a number of CHRs and […]
Read Full Post »
Posted in Technology on Jun 15th, 2016
A few days ago I was sitting at a client with a colleague tasked with some simple pentesting to prove that our risk analysis was valid. We had already conducted social engineering to get into the buildings so our test now was to find a way into their Office365. As we had network access with […]
Read Full Post »
Posted in Technology on Mar 6th, 2016
I have started to device a set of security mechanism that will end up as a pattern in the month to come. However, I think you all are interested in the reasoning how to protect yourself? First of all, you need to start looking at access paths, how does the ransomware hit you. The access […]
Read Full Post »
Posted in Methodology, Technology on Mar 4th, 2016
I have to say that I really hate ransomware. It´s just like the old times when a henchman placed himself outside your store and blocked your customers from coming in but without the satisfaction of beating him with a bat to make him go away. A client of mine was targeted with a ransomware and […]
Read Full Post »
Posted in Technology on Feb 18th, 2016
It comes to no one surprise that ransomware is striking everywhere. There is a lot of money in a successful operation as well. Cryptolocker managed to get paid $200M before it was closed down for good, still there is a spread of infections of Cryptolocker but now there is no possibility to get an unlock […]
Read Full Post »