Popular Articles
SMB Signing not required vulnerability
Description: The vulnerability is attacker able to perform the man in the middle attack between SMB server and client communication. This vulnerabilty occurs the lack of SMB misconfiguration. The vulnerability is leads to the MITM,SMB relay attacks. ...
LLMNR Poisoning
Description: LLMNR poisoning is a network-based attack where an attacker sets up a rogue machine on the network to intercept name resolution requests. When a machine on the network attempts to access a file-sharing resource or hostname that is ...
cortex xdr custom xql query to view server operational status
hi, Most of the customer who uses paloalto cortex xdr want to visualize the server operational status in a dashboard in that case use below query as follows, "dataset = endpoints | filter operating_system contains "windows server" or operating_system ...
SSL Medium Strength Cipher Suite Supported (SWEET32)
Description: SWEET32 is a cryptographic attack that exploits birthday attacks on 64-bit block ciphers, specifically targeting cipher suites like 3DES (Triple DES) and Blowfish when used in TLS, SSH, IPSec, or other encrypted protocols. Impacts The ...
Network VAPT PPT