C2 by DNS lookups

Hello security folks out there, today we are going to look at a topic that allows, for amazingly simple, external executions. The whole thing is based on DNS and should therefore work […]

what about: JWT

In a world full of web services, APIs and clouds, authentication and authorisation needs to be rethought. Basic methods such as Kerberos are no longer applicable, or only partially applicable, to these […]