The Dangers of Legacy ProtocolsHow poisoning legacy broadcast name resolution protocols led to domain compromiseIn a recent (more…)Rachel Braford2025-04-03T16:01:17+00:00Tags: pen|
Exploiting API EndpointsRelying on frontend controls for access (more…)Rachel Braford2024-12-13T23:46:26+00:00Tags: pen|
Abusing Default CredentialsAttackers can exploit default credentials to (more…) Rachel Braford2024-12-11T19:41:24+00:00
Weaponizing Legacy SoftwareLegacy software that uses web traffic (more…) Rachel Braford2024-11-27T19:14:36+00:00