Having a cybersecurity expert is essential to avoid becoming the next target. Let's secure the digital world together!

Symeon Papadimitriou

Abusing ADCS for Domain Admin Privileges

Disclaimer: Please be aware that the scenario depicted is a replication in a locally configured domain environment. While the technical steps and attack path accurately represent the real client engagement, all workstations, user accounts, passwords, and naming conventions (such as certificate templates) have been altered to protect client confidentiality and comply with my NDA contract. Introduction During an internal network assessment of a client’s Active Directory environment, I identified a critical misconfiguration that could allow unauthorized users to escalate their privileges to Domain Admin.

Setting Up an AVD for Android Penetration Testing

Introduction In Android penetration testing, having an Android Emulator is mandatory for two key reasons: 1. Continuity of Testing: If the physical rooted test device does not operate or becomes unusable, an emulator allows for continued testing without interruption. 2. Defense Mechanism Testing: Emulators are needed for evaluating the effectiveness of defense mechanisms of Emulator Detection, a requirement of the MASVS-RESILIENCE-1 security requirement in the OWASP Mobile Application Security Verification Standard (MASVS).

Critical IDOR Flaws in Online Banking Application

Disclaimer: Please be aware that even though some content in screenshots, such as endpoints, parameters, and values, may appear unblurred, it has been altered to comply with my NDA contract and protect client confidentiality while ensuring that the meaning and context remain intact. Introduction Recently, during a web assessment of an online banking system, I identified a critical vulnerability that could lead to unauthorized access or manipulation of sensitive information.
0%