Komodo ResearchJul 18, 20193 min readPlaying with Connected Files: a story of mysterious behavior in Windows file-systemA while back, I was working on some offline HTML files using Microsoft’s Office Word for some side project. I simply created an empty...
Komodo ResearchJun 25, 20196 min readWHY RED-TEAM? What is Security Red-Team? A security red-team is a test that aims to assess the security level of an organization, identify main weaknesses
Komodo ResearchJun 12, 20197 min readBypassing CrowdStrike in an Enterprise Production Network [in 3 Different Ways] EDR solutions and specifically CrowdStrike Falcon are giving us a hard time recently. It seemed that no matter how covert we tried to be,...
Komodo ResearchMay 30, 20193 min readWhen all else fails - find a 0-dayHow a failing red-team engagement led us to find a silly zero day. And why “insecure by default” is still an issue in 2019.
Komodo ResearchApr 25, 20193 min readThrough the cloud – remote debugging to crack MQIn a simple penetration test the tester is presented with a target, say a web application, and attacks it from his workstation. However,...
Komodo ResearchApr 11, 20194 min readAV WARS: Fighting fire with fire [AV Bypass Technique]Back when I started doing red team engagements for Komodo, bypassing AV solutions was quick and trivial, almost a ‘non-brainer.’ Just...