Category: Hacking

You Failed Your Pen Test: How Can You Reduce Your Attack Surface?

Penetration testing is a critical best practice for virtually any organization’s cybersecurity posture. By putting defenses to the test against...
Read Now

From Public Key to Exploitation: How We Exploited the Authentication in MS-RDP

In March Patch Tuesday, Microsoft released a patch for CVE-2018-0886, a critical vulnerability that was discovered by Preempt. This vulnerability...
Read Now

Security Advisory: Critical Vulnerability in CredSSP Allows Remote Code Execution on Servers Through MS-RDP (Video)

In March Patch Tuesday, Microsoft released a patch for CVE-2018-0886, a vulnerability discovered by Preempt researchers. The vulnerability consists of...
Read Now

New LDAP & RDP Relay Vulnerabilities in NTLM

Over the past few months, the Preempt research team discovered and reported two Microsoft NT LAN Manager (NTLM) vulnerabilities. These...
Read Now

QakBot, Stop Playing with my Active Directory!

Really, it’s not just me saying that Active Directory is the crown jewel. It's actually them, the hackers, that de...
Read Now