Topics
Topics
The field is empty
Amit German

Cyber Security Researcher at Pentera

3 articles by this writer

How Attackers Can Achieve a DoS Attack in Microsoft Active Directory

In this blog, we explore how attackers can exploit a limitation in Active Directory (AD) Security Identifiers (SIDs) to lock users out of the domain w...

How to attack and protect WebLogic server

WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a val...

Finding MSSQL Database Version with TDS Protocol

The version of an MSSQL database is a valuable piece of information for cyber attackers. With the version details in hand, they can attempt to find ...