Skip to content

Blog

Jenkins Vulnerability Exposed: Exploiting CVE-2024-23897 to Access System Files

Jenkins Vulnerability Exposed: Exploiting CVE-2024-23897 to Access System Files

Introduction One of the most talked-about vulnerabilities this year is CVE-2024-23897, a critical Remote Code Execution (RCE) flaw in Jenkins, a popular open-source automation server used for building, testing, and deploying software. Understanding how attackers might exploit this vulnerability and how to use Shodan dorks to identify vulnerable systems is crucial for protecting your infrastructure.… Read More »Jenkins Vulnerability Exposed: Exploiting CVE-2024-23897 to Access System Files

Red Teaming vs Penetration Testing – What is the Difference?

Table of Contents Definition of Red Teaming Definition of Penetration Testing Key Objectives of Red Teaming Key Objectives of Penetration Testing Project Focus: Depth vs. Breadth Attack Methods Used Deliverables: What Each Process Provides Action Plans: Linear vs. Flexible Approaches Real-World Case Studies Case Study 1: Industrial Company Case Study 2: Retail Company Tools and… Read More »Red Teaming vs Penetration Testing – What is the Difference?

Understanding Remote Procedure Calls (RPC)

Introduction Remote Procedure Call (RPC) is a well-established technology for distributed computing. The technology provides the solution to a fundamental problem in distributed computing, which is: how to execute a program remotely over the network on a different computer reachable over a network. What is a Remote Procedure Call (RPC)? Remote Procedure Call is a… Read More »Understanding Remote Procedure Calls (RPC)

What is Continuous Automated Red Teaming (CART)?

Table of Contents What is Continuous Automated Red Teaming (CART)? How Does Continuous Automated Red Teaming Work? Challenges with Traditional Red Teaming The Evolution to Continuous Automated Red Teaming Benefits of Continuous Automated Red Teaming Continuous Automated Red Teaming vs. Penetration Testing Why CART Matters in Modern Cybersecurity Implementing CART in Your Organization Conclusion: The… Read More »What is Continuous Automated Red Teaming (CART)?

Regular Expression Denial of Service (ReDoS) Attack

ReDoS attack: Regular expression Denial of service

A Regular Expression Denial of Service (ReDoS) is an attack that takes advantage of the inefficiencies in many regular expression (Regex) engines, causing a program to slow down or become unresponsive. This occurs because certain Regex patterns and input combinations can trigger super-linear worst-case performance, where the time required for evaluation increases exponentially or polynomially… Read More »ReDoS attack: Regular expression Denial of service