Topics
Topics
The field is empty
Amit German

Cyber Security Researcher at Pentera

3 articles by this writer

How Attackers Can Achieve a DoS Attack in Microsoft Active Directory

In this blog, we explore how attackers can exploit a limitation in Active Directory (AD) Security Identifiers (SIDs) to lock users out of the domain w...

How to attack and protect WebLogic server

WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a val...

Finding MSSQL Database Version with TDS Protocol

The version of an MSSQL database provides valuable information that cyber attackers can exploit. With the version details in hand, they can attempt ...