Your guide to NTLM relay, Part 2: Delivering relay attacks

Date: 27/01/2025

NTLM relay attacks aren’t new to pentesters. In most cases, the main prerequisite for a successful relay attack isn’t a vulnerability, but an infrastructure misconfiguration; this is why such attacks are often used in real-life situations. This article discusses relay attacks and techniques used to deliver them – assuming that you have already hijacked NTLM authentication.
Read full article →

GPS spoofing: How to become a satellite

Date: 25/01/2025

Each of us uses satellite navigation to get anywhere outside our backyard. But what if GPS, as of a sudden, stops working and cannot be used to determine your location anymore? This article presents an efficient technique enabling you to fool GPS.
Read full article →