top of page
![Global Cybersecurity | Blog](https://static.wixstatic.com/media/3184af_940d52e4007440e5a9949fc7440f7dbb~mv2.jpg/v1/fill/w_980,h_143,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/3184af_940d52e4007440e5a9949fc7440f7dbb~mv2.jpg)
BLOG
Search
![](https://static.wixstatic.com/media/3184af_5669dbee8ce54c36bce69f7ce558a82d~mv2_d_5000_4000_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3184af_5669dbee8ce54c36bce69f7ce558a82d~mv2_d_5000_4000_s_4_2.webp)
![Playing with Connected Files: a story of mysterious behavior in Windows file-system](https://static.wixstatic.com/media/3184af_5669dbee8ce54c36bce69f7ce558a82d~mv2_d_5000_4000_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/3184af_5669dbee8ce54c36bce69f7ce558a82d~mv2_d_5000_4000_s_4_2.webp)
Komodo Research
Jul 18, 20193 min read
Playing with Connected Files: a story of mysterious behavior in Windows file-system
A while back, I was working on some offline HTML files using Microsoft’s Office Word for some side project. I simply created an empty...
1,524 views0 comments
![](https://static.wixstatic.com/media/3184af_d89390bf01b04309b21b4e2f61f55b10~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3184af_d89390bf01b04309b21b4e2f61f55b10~mv2.webp)
![WHY RED-TEAM?](https://static.wixstatic.com/media/3184af_d89390bf01b04309b21b4e2f61f55b10~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/3184af_d89390bf01b04309b21b4e2f61f55b10~mv2.webp)
Komodo Research
Jun 25, 20196 min read
WHY RED-TEAM?
What is Security Red-Team?
A security red-team is a test that aims to assess the security level of an organization, identify main weaknesses
777 views0 comments
![](https://static.wixstatic.com/media/3184af_b8a92681773e47e5b85825eaa4f2baa9~mv2_d_5500_3671_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3184af_b8a92681773e47e5b85825eaa4f2baa9~mv2_d_5500_3671_s_4_2.webp)
![Bypassing CrowdStrike in an Enterprise Production Network [in 3 Different Ways]](https://static.wixstatic.com/media/3184af_b8a92681773e47e5b85825eaa4f2baa9~mv2_d_5500_3671_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/3184af_b8a92681773e47e5b85825eaa4f2baa9~mv2_d_5500_3671_s_4_2.webp)
Komodo Research
Jun 12, 20197 min read
Bypassing CrowdStrike in an Enterprise Production Network [in 3 Different Ways]
Bypassing CrowdStrike in an enterprise production network EDR solutions and specifically CrowdStrike Falcon are giving us a hard time...
52,478 views1 comment
![](https://static.wixstatic.com/media/3184af_ede6366ec30b4ee7b1ee274d194cc4d9~mv2_d_4896_3264_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3184af_ede6366ec30b4ee7b1ee274d194cc4d9~mv2_d_4896_3264_s_4_2.webp)
![When all else fails - find a 0-day](https://static.wixstatic.com/media/3184af_ede6366ec30b4ee7b1ee274d194cc4d9~mv2_d_4896_3264_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/3184af_ede6366ec30b4ee7b1ee274d194cc4d9~mv2_d_4896_3264_s_4_2.webp)
Komodo Research
May 30, 20193 min read
When all else fails - find a 0-day
How a failing red-team engagement led us to find a silly zero day.
And why “insecure by default” is still an issue in 2019.
8,251 views20 comments
![](https://static.wixstatic.com/media/d383fe_3b8d4a09ab274e2cb9cbcdddb1313066~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/d383fe_3b8d4a09ab274e2cb9cbcdddb1313066~mv2.webp)
![Through the cloud – remote debugging to crack MQ](https://static.wixstatic.com/media/d383fe_3b8d4a09ab274e2cb9cbcdddb1313066~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/d383fe_3b8d4a09ab274e2cb9cbcdddb1313066~mv2.webp)
Komodo Research
Apr 25, 20193 min read
Through the cloud – remote debugging to crack MQ
In a simple penetration test the tester is presented with a target, say a web application, and attacks it from his workstation. However,...
773 views0 comments
![AV WARS: Fighting fire with fire [AV Bypass Technique]](https://static.wixstatic.com/media/3184af_2113a1d0165d4927a8ec9efe3dbeeb6e~mv2.png/v1/fill/w_226,h_223,fp_0.50_0.50,q_95,enc_auto/3184af_2113a1d0165d4927a8ec9efe3dbeeb6e~mv2.webp)
Komodo Research
Apr 11, 20194 min read
AV WARS: Fighting fire with fire [AV Bypass Technique]
Back when I started doing red team engagements for Komodo, bypassing AV solutions was quick and trivial, almost a ‘non-brainer.’ Just...
2,592 views0 comments
bottom of page