The Perfect Android OS Doesn’t Exist…

Why GrapheneOS is the Best Android ROM: A Deep Dive into Privacy, Security, and Usability In the evolving landscape of mobile operating systems, GrapheneOS has emerged as one of the most advanced and privacy-centric custom ROMs for Android devices. Built with a focus on security and privacy, GrapheneOS has taken Android’s open-source architecture and improved … Read more

Exploiting Firebase

Advanced Firebase Exploitation: Risks, Attack Techniques, Mitigations, and Detection Firebase, a cloud-based platform by Google, powers countless mobile and web applications by providing real-time databases, authentication, hosting, and more. Its ease of use and powerful features make it a popular choice for developers. However, Firebase’s inherent flexibility, combined with the complexity of cloud environments, introduces … Read more

Simple Mail Transfer Protocol (SMTP)? Good For You, Better For Me!

Simple Mail Transfer Protocol (SMTP) Overview Simple Mail Transfer Protocol (SMTP) is pivotal for sending emails between clients and servers. Attackers can exploit SMTP vulnerabilities through spamming and spoofing. SMTP vulnerabilities enable attackers to use tools like Telnet or Netcat to send emails, probe for open relays, and verify email addresses for targeted attacks or … Read more

Securing Your Smart Contracts: 3 Common Vulnerabilities & How to Prevent Them

Throughout your security career, you may come across terms such as Common Vulnerabilities and Exposures (CVE) or Common Vulnerability Severity Score (CVSS). These terms usually refer to weaknesses in software, applications, or operating systems that are public-facing or internal on an organization’s network. However, some CVEs may not be familiar to you, such as smart … Read more

A Penetration Tester’s Best Friend – Multicast DNS (mDNS), Link-Local Multicast Name Resolution (LLMNR), and NetBIOS-Name Services (NetBIOS-NS)

Introduction Throughout our penetration testing engagements, we’ve discovered that gaining an initial foothold in a domain or acquiring user credentials can often be much easier than expected. Why is that? The culprit is often the fallback protocols—NetBIOS, LLMNR, and mDNS. While many organizations claim that these protocols are either “fixed” or pose no risk, the … Read more

The Impact of Data Brokers: Uncovering Their Role in Data Breaches

Introduction As a follow-up to my previous article regarding attack surface management, data breaches have become a recurring nightmare for organizations in the digital age. As sensitive information becomes increasingly stored and shared online, the threat of a breach continues to loom. While many factors contribute to data breaches, one that is often overlooked is … Read more