Latest posts

Our team researches and documents bleeding-edge security concepts and hacking techniques. This blog explores these topics and more to keep you informed.

Our Response to COVID-19

By Cornel du Preez | April 13, 2020 | Blog

Abricto Security understands that all industries feel the impact of COVID-19 and we’re here to help. Our team is shifting our operating procedures to accommodate fully remote consultations and assessments. Here is how we plan to do so: We will

Read More »

SQLmap Cheatsheet and Examples

By Cornel du Preez | April 02, 2020 | Blog

Target the http://target.server.com URL using the “-u” flag: sqlmap -u ‘http://target.server.com’ Specify POST requests by specifying the “–data” flag: sqlmap -u

Read More »

Extracting Private Keys From Public Keys Generated With Weak Random Number Generators

By Cornel du Preez | March 19, 2020 | Blog

Public key encryption is heavily utilized in modern implementations of SSH. By leveraging public key cryptography, administrators can generate both a public key and a private key to encrypt and decrypt data in transit. Using this method is favored

Read More »

Password List Generation Using CUPP

By Cornel du Preez | February 07, 2020 | Blog

In many of our network and web application penetration tests, we come across login portals that aren’t protected by anti-automation controls. Essentially, this allows us to launch unrestricted brute-force attacks on previously identified

Read More »

AWS Port Forward Setup and Config

By Cornel du Preez | January 10, 2020 | Blog

What Port forwarding or port address translation (PAT) is a method of altering the destination port of traffic by using a forward proxy. Why There are multiple possible reasons to use a PAT server for port forwarding. Here are just a few: Running

Read More »