Developing Cobalt Strike BOFs with Visual Studio

Cobalt Strike beacon object files (BOFs) is a feature that was added to the beacon in order to allow rapid beacon extendibility in a more OPSEC way. The BOF...Read more...

Blogs

  • Should 2FA secrets be encrypted?

    Time based OTP is commonly used for two-factor authentication. It works with a symmetric key. The server generates a key and stores it. It shows a QR code containing the key to the user, who then scans it and stores the key in their phone. The phone uses this key to generate a OTP, which the server can verify.
    A...
    Read more...

  • Why reporting for a penetration test is so important

    Worldwide, thousands of cyber security companies provide many types of penetration tests. But what makes a penetration test and the results stand out for customers? Securify knows it is difficult to see the details of penetration testing processes for customers during a project due to the fact that some of them are...Read more...

  • Why every organization needs to start with Attack Modeling

    While performing security assessments, we at Securify noticed that even though frameworks and network appliances are becoming more secure. Applications and appliances more often than not, provide secure default values regarding the configurations. In addition, we see that guidelines such as those provided by the NCSC...Read more...

  • Bypassing Microsoft Defender for Endpoint in Red Teaming assessments

    Nowadays it is common for Red Teamers to find more or less advanced endpoint and network protection mechanisms during their assessments. With a big share of the enterprise market taken by Microsoft, it is important to be familiar with Windows/Azure AD and Microsoft 365 Defender. In one of our latest assessments we...Read more...

  • Best INSIGHT IN YOUR CYBERSECURITY WITH RED TEAMING OR A SCENARIO BASED PENTEST

    Most organizations have the basic security of their ICT infrastructures covered and thereby strengthened. However, cyber criminals are extremely smart and are constantly developing new tools and techniques to anticipate these defenses. To reduce the distance, more is needed than just taking basic measures: a better...Read more...

Questions or feedback?

Call usphone
Mail usmail