Henrik Falk December 19, 2024
2024 Edition of Our Favorite Pen Testing Tools
It's time for another hacking tool roundup! We’ve polled our team of experts to bring you the most powerful and innovative penetration testing tools. With so many different options to choose from, we thought it would be helpful to share some of our favorite go-to’s.
bishopfox.com/blog/pen-testing-tools-2024
Diving into ADB protocol internals (2/2)
In this article, we'll dive into the message protocol between ADB Server and adbd, with the goal of improving our Rust client library with capacity to fully interact with a device, eliminating the need for system dependency installations.
www.synacktiv.com/publications/diving-into-adb-protocol-internals-22.html
LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory
This article provides a practical guide to developing a detection strategy for Lightweight Directory Access Protocol (LDAP)-based attacks. We analyze real-world examples of nation-state and cybercriminal threat actors abusing LDAP attributes. We also examine common LDAP enumeration queries and assess their potential risks.
unit42.paloaltonetworks.com/lightweight-directory-access-protocol-based-attacks