Skip to content

Red Teaming

What are the SEBI guidelines on Red Teaming & Continuous Automated Red Teaming (CART)?

What are the SEBI guidelines on Red Teaming & Continuous Automated Red Teaming (CART)?

What are the SEBI Guidelines on Red Teaming and Continuous Automated Red Teaming (CART)? Table of Contents Overview of SEBI Guidelines on Red Teaming Definition of Red Teaming Exercises Reporting Cybersecurity Incidents Incident Response Management Plan Cyber Crisis Management Plan (CCMP) Role of Security Operations Centers (SOCs) Compliance Timeline for Regulated Entities Preparing for SEBI… Read More »What are the SEBI guidelines on Red Teaming & Continuous Automated Red Teaming (CART)?

The Art of Keytab Files

A keytab file is a file containing pairs of Kerberos principals and encrypted keys. These files are used to authenticate a principal on a network. Kerberos is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Brief Overview of Keytab Files… Read More »The Art of Keytab Files

How do attackers utilize .git

How Do Attackers Utilize .git For Fun And Profit?

Security teams are busy fixing CVEs, SQLi, and other critical vulnerabilities. However, exposing .git can potentially leak credentials, source code and other sensitive information. In this blog, we will uncover the dangers of hidden exposed .git, and how to identify and mitigate the relevant risk. Introduction In the realm of software development, Git stands as… Read More »How Do Attackers Utilize .git For Fun And Profit?

Uncovering The Robots.txt Role In Cybersecurity

In the ever-changing realm of cybersecurity, it’s the small details that often matter the most. The robots.txt file, while seemingly insignificant, is a crucial component that can fortify a website’s security. We will explore robots.txt in-depth, delving into its functions, and uncovering its role in Cyber Security. Robots.txt: A Closer Look Robots.txt, short for “Robots… Read More »Uncovering The Robots.txt Role In Cybersecurity

Top 25 Tools For Red Teaming

Top 25 Tools For Red Teaming

What is Red teaming? Red teaming is a valuable technique that can help you to identify and mitigating security vulnerabilities in your organization’s attack surface by simulating real-world attacks. Organizations use hundreds of tools to conduct traditional or manual red teaming activities in different combinations. Here are top 25 most common tools used by Red… Read More »Top 25 Tools For Red Teaming