News

¿Conoces nuestros servicios de Identificación, basados en NIST CSF?

Do you know our Identification services, based ...

Iñigo Ladrón Morales

At Zerolynx we are specialists in professional services for businesses in matters of cybersecurity. Specifically in corporate security, corporate cybersecurity, intelligence corporate, cyber intelligence corporate and asset security. Our services...

Do you know our Identification services, based ...

Iñigo Ladrón Morales

At Zerolynx we are specialists in professional services for businesses in matters of cybersecurity. Specifically in corporate security, corporate cybersecurity, intelligence corporate, cyber intelligence corporate and asset security. Our services...

CVE-2024-30078: Ejecución remota de código del controlador Wi-Fi de Windows

CVE-2024-30078: Windows Wi-Fi Driver Remote Cod...

Celia Catalán

On June 11, Microsoft published in its patch news a high-impact vulnerability that affected the Windows Wi-Fi driver, which consisted of remote code execution...

CVE-2024-30078: Windows Wi-Fi Driver Remote Cod...

Celia Catalán

On June 11, Microsoft published in its patch news a high-impact vulnerability that affected the Windows Wi-Fi driver, which consisted of remote code execution...

ADExplorer - cómo enumerar un dominio cuando el antivirus no está de acuerdo

ADExplorer - how to list a domain when antiviru...

Celia Catalán

In today's installment we are going to be talking about how to list a domain when the antivirus does not agree. During a security audit, enumerating the domain is a...

ADExplorer - how to list a domain when antiviru...

Celia Catalán

In today's installment we are going to be talking about how to list a domain when the antivirus does not agree. During a security audit, enumerating the domain is a...

Certificate Service Relaying

Certificate Service Relaying

Celia Catalán

After forcing authentication and obtaining the NetNTLM hash of the password of the victim's machine user, we are presented with different exploitation scenarios which we will discuss throughout...

Certificate Service Relaying

Celia Catalán

After forcing authentication and obtaining the NetNTLM hash of the password of the victim's machine user, we are presented with different exploitation scenarios which we will discuss throughout...

Tickets Kerberos - Diamond Ticket

Tickets Kerberos - Diamond Ticket

Celia Catalán

Completing the delivery of Kerberos Tickets, we give way to the Diamond Ticket. Like a Golden Ticket, a Diamond Ticket is a TGT that can be used to access any...

Tickets Kerberos - Diamond Ticket

Celia Catalán

Completing the delivery of Kerberos Tickets, we give way to the Diamond Ticket. Like a Golden Ticket, a Diamond Ticket is a TGT that can be used to access any...

Tickets Kerberos - Silver Ticket

Tickets Kerberos - Silver Ticket

Celia Catalán

Continuing with the deliveries of Kerberos Tickets, in past publications we have talked about the Golden Ticket, this time we will be talking about the Silver Ticket. SILVER TICKET The...

Tickets Kerberos - Silver Ticket

Celia Catalán

Continuing with the deliveries of Kerberos Tickets, in past publications we have talked about the Golden Ticket, this time we will be talking about the Silver Ticket. SILVER TICKET The...