GPS spoofing: How to become a satellite

Date: 25/01/2025

Each of us uses satellite navigation to get anywhere outside our backyard. But what if GPS, as of a sudden, stops working and cannot be used to determine your location anymore? This article presents an efficient technique enabling you to fool GPS.
Read full article →

Your guide to NTLM relay: Hijacking NTLM authentication to deliver a relay attack

Date: 24/01/2025

Why NTLM authentication is still present in many infrastructures? The correct answer is: because Windows cannot exist without it. But NTLM authentication is marred by a number of problems that can be exploited by attackers. One of such problems is its vulnerability to relay attacks. This article discusses authentication hijacking techniques enabling you to deliver a relay attack.
Read full article →