Articles
Learn more about different fields of IT security.
Here you can keep up with what we’re up to, some useful information about encryption, cyber security knowledge and much more.
We regularly publish articles on cyber security and other relevant info.
You can find them on this page in our article database.
Happy reading!
Article database ReTest
The ReTest team regularly writes articles about what’s happening in the IT security industry, cyber security guides, tips and tricks, what ReTest is currently working on, events we participate in and much more.
Senior Consultant – Hardening and Tiering
Can you advise our customers and harden their infrastructure? Senior Consultant, Blue Team Job posting, February 2024 Location: Herlev The one who eats GPOs for breakfast and thinks in Tiers at night At ReTest, we've spent the last four years working with customers to...
Local Privilege Escalation Vulnerability found in “Local Admin Service”
By ReTest Security During a security test for one of our customers, it was observed they were using “Local Admin Service” version 1.2.7.23180, which is developed by Edgemo (now owned by Danoffice IT). This service enables employees to temporarily elevate their...
Local privilege escalation – ft. WSUS misconfigurations, a rogue access point, and delivery optimization
By Paul Arzelier Local privilege escalation – ft. WSUS misconfigurations, a rogue access point, and delivery optimization Windows Server Update Service (WSUS) misconfigurations have since 2020 been used for local privilege escalation. Most of the methods to do so rely...
Terrapin vulnerability exposes a flaw in the SSH protocol
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795) We are starting to see the Terrapin vulnerability more and more with our customers. This security hole from December 2023 allows hackers to exploit weaknesses in security certificate management, leading...
The colorful world of Cybersecurity
Red, Blue, Purple, Yellow, Green, Orange… and White? Who would've thought the world of cybersecurity is as colorful as a rainbow - a Cyberbow, if you will. Here at Retest Security, we're diving into the vibrant hues of this world, which is quite the adventure,...
The Azure Policies You Can’t Ignore: Conditional Access Basics
Introduction This article is relevant only for organizations that are actively using or beginning to use Conditional Access Policies. In the ever-changing cybersecurity landscape, it is critical to stay ahead of potential attack vectors. The increase in cloud-based...
Why you should choose a Vulnerability Scanner that can scan with credentials
In a situation where you need to invest in one or the other form of vulnerability management, it is important to investigate whether you can scan with credentials. This means it can be used for everything. However, scanning without credentials can also be...
An Attackers Guide to Hiding Your Back-end APIs
When it is possible for an attacker to obtain a lot of detailed information about a web application, it speeds up the time needed to find any potential vulnerabilities in said application. In this paper, we discuss how you can ”hide” information about your back-end...
Want a call back?
Use the contact form and we will call you back within 48 hours.
Recent Comments