PinnedFortiGate Firewall Application Control: Detailed GuideFortiGate Firewall Application Control: Detailed GuideFeb 20Feb 20
How to Gain Remote Access Control Using Certutil.exeHello! Certutil.exe is generally used in Windows for certificate management and file transfers, but it can also be exploited by malicious…Mar 22Mar 22
Fast, Smart and Verbose Mods in SplunkThe “splunkta” command, which interacts with the “splunkd” service in Splunk, is used to manage logs in Splunk Universal Forwarder and…Mar 18Mar 18
Certutil.exe and Bitsadmin.exe: How Trusted Tools Can Be Abused?Some built-in tools in the Windows operating system are highly useful for system administrators and security experts. However, these tools…Mar 13Mar 13
Active and Passive Reconnaissance: Methods and ToolsIn the field of cybersecurity, reconnaissance is the initial phase of an attack or security assessment. It involves gathering information…Mar 13Mar 13