Overview
During a recent adversary simulation, the MDSec ActiveBreach red team were asked to investigate the organisation's Password Manager solution, with the key objective of compromising stored credentials, ideally from an unauthenticated perspective.
As part of this engagement, Sean Doherty & Juan Manuel Fernandez carried out a detailed analysis of the Password Manager solution (Pleasant Password Server). Resulting in the
Read more
Tags: ActiveBreach, red, credentials, penetration-testing, Password, red-team, adversary, server, MDSec, Adversary Simulation, Analysis, Perspective, Simulation, password manager
Related Posts
- CVE-2023-26258 – Remote Code Execution in ArcServe UDP Backupa
- Leveraging VSCode Extensions for Initial Accessa
- Attack like a Red Team (not using Devops)— ep.1 : How Red Team worksa
- What is a ‘purple team’ in cyber security? (2023)a
- Unlocking the power of Red Teaming: An overview of trainings and certificationsa