maldevel ☣

26.9K posts

maldevel ☣ banner
maldevel ☣

maldevel ☣

@maldevel

code, pentest, redteam, research

Greece Katılım Eylül 2009
654 Takip Edilen8.3K Takipçiler
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
🎭 The #Attack With a Real Login Page This technique is called #device code phishing, or OAuth device code flow abuse. It abuses the #OAuth 2.0 device authorization grant, originally designed for devices with limited input, like smart TVs, IoT devices, and CLI tools. The device shows a code, the user visits a verification URL, enters the code, and authenticates the device. Microsoft implements this at microsoft.com/devicelogin. Attackers weaponize that trust. They initiate a legitimate device code request against Microsoft’s identity platform, often impersonating apps like Microsoft Office, Teams, or Azure CLI. Microsoft returns a real code, usually valid for around 15 minutes. The victim is then asked to "verify their identity" or "join a Teams meeting" by entering that code on Microsoft’s real login page. --- 🧨 Why #MFA Still Passed When the user completes the flow, they are not logging into their own session. They are authorizing the attacker’s session. #Microsoft then issues access and refresh tokens to the attacker-controlled polling endpoint. Those tokens can provide access to mailboxes, SharePoint, Teams, and federated apps. MFA passes because the user genuinely authenticated. Conditional Access may pass because the interaction appears to come from the user’s real device and location. Anti-phishing training fails because there is no fake domain to spot. Microsoft has reported active device code phishing campaigns by Storm-2372, a threat actor assessed as likely aligned with Russian interests, active since August 2024 and observed targeting organizations through 2025. --- 🛡️ The Fix Is #Configuration, Not More Posters Block device code flow by default in Entra ID using Conditional Access authentication flow controls. Allow it only for specific users, apps, or scenarios that truly need it, such as kiosks or legacy CLI workflows. Then alert on every successful device code authentication. In most environments, this should be rare, predictable, and easy to investigate. - logisek.com #CyberSecurity #RedTeam #PenTest #InfoSec #OffSec #SecurityMindset #OffensiveSecurity #CloudSecurity #IdentitySecurity #Logisek
Logisek tweet media
English
0
1
1
93
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
#Threats Change. Foundations Don’t. Every week there’s a new headline. Tomorrow, something else entirely. But here’s the uncomfortable truth: most breaches don’t need new threats, they exploit old, well-known weaknesses that were never properly addressed. AI just makes it faster, attackers move faster, while you keep operating at the same pace. Instead of reacting to every new name in the threat landscape, take a step back and focus on what actually reduces risk. Perform a pentest now. Identify your real security gaps under realistic conditions. Prioritize and remediate critical and high-risk findings. Follow up with configuration audits and structured security hardening across your infrastructure. This is how you build confidence in your #defenses, not by chasing headlines, but by systematically eliminating the weaknesses attackers consistently rely on. --- The #Illusion of "New" Risk #Attack names evolve faster than defenses. Yet during #RedTeam engagements, we rarely need zero-days. Misconfigurations, weak identity controls, and poor segmentation still open the door. The "new threat" narrative often distracts from the real issue: inconsistent #security fundamentals. --- #Engineering Over Panic #Security #engineering isn’t about chasing headlines, it’s about building resilience. Harden your systems. Validate configurations. Test assumptions. A well-executed security assessment or pentest doesn’t just find vulnerabilities, it measures how well your defenses actually hold under pressure. --- What Actually Works - Consistent #hardening baselines. - Regular, realistic #pentests. - Continuous #validation of controls. This is where confidence comes from, not from reacting to every new name in the threat landscape. If lateral movement is nearly eliminated, your external attack surface is minimal, your workstations are hardened with no admin privileges and unknown executables blocked, and your internal network has nothing more than moderate and low findings, does it really matter what the next threat is called? If you know your systems and understand your threats, you need not fear the outcome of any attack. - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #SecurityEngineering #SecurityMindset #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
93
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
The 3-Letter #Breach Nobody Notices It doesn’t start with #malware or #phishing. It starts with three innocent letters typed too quickly, a file shared with the wrong person, unnoticed, until months later when the mistake finally surfaces. --- The Hidden Risk in "gpa*" During assumed breach exercises and #configuration #audits, we repeatedly uncover a subtle but dangerous pattern in OneDrive and SharePoint. Users often share access by typing just the first 2–3 letters of a name, "gpa*", assuming the right person will be selected. But in environments with similar usernames (e.g., gpappas, gpapadopoulos), access frequently lands in the wrong hands. --- ⚠️ How Mistakes Become Exposure The error often goes unnoticed. The intended recipient eventually asks for access, and the owner simply adds them, without removing the unintended user. Not out of negligence, but due to time pressure and lack of visibility. Over time, these small oversights compound into silent data exposure. --- Why This Is a Security Problem Attackers don’t need to break in when access is already misconfigured, and insider threats thrive in the same gaps. Regular audits, access reviews, and smarter sharing controls are not optional; they are essential. Not surprisingly, during audits, clients are often shocked to discover just how many unintended users have access. - logisek.com #CyberSecurity #RedTeam #PenTest #InfoSec #OffSec #IdentitySecurity #Logisek
Logisek tweet media
English
5
1
2
222
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
#Pentesting Beyond the Checkbox At #Logisek, you’re not paying for a pentest report, you’re investing in understanding how your business could actually be breached. And it doesn’t end with report delivery; our consultants stay with you, helping you understand the findings, prioritize what matters most, and work alongside your IT team, vendors, and partners to navigate the often complex path of remediation. --- Not a #Game of Flags In #infrastructure pentesting, we don’t chase trophies or isolated exploits. Whether external or internal, the goal is simple: simulate a real attacker. That means going beyond "one critical finding" and digging into everything, default credentials, exposed admin panels, weak configurations, and overlooked access paths that quietly expand the attack surface. --- 🧭 #Guided, Not Guesswork Our approach is grounded in proven methodologies: #OWASP Testing Guide, #OSSTMM, #PTES, and #NIST SP 800-115. But frameworks alone aren’t enough. Every engagement includes opportunistic black-box testing of discovered web apps, because attackers don’t ask for architecture diagrams, they adapt to what they find. --- ⚙️ From Access to Impact Scanning is just the start. #Exploitation, post-exploitation, and pivoting reveal the real story. Can a low-privileged foothold become domain admin? Can one misconfiguration cascade into full compromise? That’s the difference between a report and a realistic risk assessment. --- #Security Is Depth, Not Speed Time is always limited, but depth shouldn’t be. The value of a pentest lies in how closely it mirrors real-world adversaries. - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #SecurityMindset #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
134
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
When One #Engineer Becomes Your Entire Security Model Most organizations assume the greatest risk comes from outside the organization. In reality, it’s #internal opacity, undocumented infrastructure understood by a single engineer. In more than 70% of assessments, critical knowledge is fragmented, tribal, or missing entirely. That imbalance gives attackers an edge: their reconnaissance becomes more effective than your own visibility. When an #attacker understands your environment better than you do, you’ve already lost control. --- The #Single Point of Failure No One Sees During a recent #assessment, we asked for the basics: asset inventory, network diagrams, access controls. Nothing centralized existed. Everything, from admin credentials to firewall rules, lived in one engineer’s head or on a personal spreadsheet. From an attacker’s perspective, this isn’t chaos. It’s clarity. --- 🧠 The Attacker’s Advantage Attackers don’t wait for documentation. They enumerate, map, and exploit faster than organizations can reconstruct tribal knowledge. No visibility means no defense. No ownership means no accountability. If one person holds the keys, your infrastructure is already exposed, just not to you. --- #Security maturity isn’t about tools. It’s about control: - Do you know what exists? - Can you access it under pressure? - Can you recover when it breaks? Because if your key engineer disappears tomorrow.. what’s your first move? - logisek.com #CyberSecurity #RedTeam #PenTest #InfoSec #OffSec #SecurityMindset #OffensiveSecurity #Logisek
Logisek tweet media
English
1
1
2
229
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
The Day #AV Stopped Working "We're fully covered. Our AV is bulletproof." That confidence usually lasts.. until the first Red Team or assumed breach exercise runs. --- Why AV Fails Quietly Modern attacks don't look like malware anymore. #FUD payloads, in-memory execution, and LOLBins blend into legitimate activity. No signatures, no obvious indicators, just normal-looking processes doing abnormal things. Traditional AV simply wasn't built for this kind of tradecraft. --- 🧠 The Real Gap: Assumptions vs Reality Most environments rely on beliefs: "no alerts means no compromise" or "EDR is deployed, so we're safe." But tooling without tuning, monitoring, and context is just noise. Attackers don't break defenses, they bypass assumptions. --- What Actually Changes the Outcome Shift to behavior-based detection, actively monitor your EDR, and enforce controls like application allowlisting and privilege restrictions. Most importantly, adopt an "assume breach" mindset and validate continuously through simulations. If your defenses were tested today with real adversary techniques.. what would actually happen? - logisek.com #CyberSecurity #RedTeam #PenTest #InfoSec #OffSec #Logisek
Logisek tweet media
English
0
1
1
208
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
Breaking #Mobile Apps Like Attackers Do Most mobile #pentests fail not because tools are missing, but because the methodology is. 📱 #MASTG, Driven Testing Mindset We don’t "scan apps", we systematically break them using the OWASP MASTG as a baseline. It gives us structured coverage across storage, crypto, auth, network, platform, and resilience layers, ensuring no blind spots. This isn’t checklist security, it’s repeatable, deep, and aligned with real,world attack paths. --- 🧩 Full, Spectrum #Attack Surface Our approach blends: - #Application layer → static + dynamic analysis, reverse engineering. - #API layer → auth bypass, logic flaws, data exposure. - #Device layer → rooting/jailbreaking, memory inspection, runtime hooking. We treat the app as part of a client, server ecosystem, not an isolated binary. --- 🎯 Findings That Actually Matter Every finding is mapped to #OWASP Mobile Top 10 (2024) categories, from insecure storage to improper credential usage, making risk tangible for both engineers and leadership. --- Real impact comes from chaining weaknesses across layers, not isolated vulnerabilities. - logisek.com #CyberSecurity #MobileSecurity #PenTest #RedTeam #OWASP #MASTG #InfoSec #OffSec #Logisek
Logisek tweet media
English
0
1
1
174
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
€100K #Security #Budget. Still Breached. "We invested heavily in security. How did this happen?" You approved a six-figure security budget. But did anyone verify if it was configured correctly? Tools do not secure environments. People and configurations do. Most breaches do not bypass security tools. They walk through misconfigurations left behind. --- The Illusion of Security Spend Buying #WAFs, #firewalls, #EDR, and #UTMs is easy. Hardening them is not. Default configurations, unused rules, and blind spots create a false sense of protection. --- What Was Never Checked No configuration security audit. No review of firewall rules. No validation of WAF behavior. No architecture assessment. These gaps are where real breaches happen. Misconfigurations are still one of the most reliable entry points for red teams. --- What Actually Works Security improves when you audit, review, and challenge your setup. Configuration audits uncover silent failures. Architecture reviews expose design flaws. #Cybersecurity consulting brings an #adversarial #mindset before attackers do. --- Stop Buying. Start #Hardening. You do not need more tools. You need to make the ones you have actually work. - logisek.com #CyberSecurity #RedTeam #PenTest #InfoSec #OffSec #Logisek
Logisek tweet media
English
0
1
1
177
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
When the #Gatekeeper Becomes the #Breach What happens when the very tool protecting your software supply chain is the thing that compromises it? On March 19, 2026, organizations running Trivy vulnerability scans found out the hard way: their security tool had been silently harvesting their credentials. --- A Trust Model Turned Inside Out TeamPCP did not attack Trivy's code. They attacked the trust fabric around it. An incomplete credential rotation from an earlier incident left the door cracked open. The attackers slipped through, force-pushed malicious commits to 76 of 77 trivy-action version tags, and published a backdoored binary to every distribution channel. Every pipeline referencing a version tag executed the attacker's code on its next run. No workflow file changed. No alert fired. The stealer read secrets directly from runner process memory, encrypted them, and exfiltrated them to a Cloudflare Tunnel endpoint. --- 🪱 From #Scanner to #Worm in 24 Hours Stolen npm tokens from CI/CD environments fed CanisterWorm, a self-propagating worm that infected 66+ npm packages and used a blockchain-based C2 that traditional takedowns cannot touch. The campaign then cascaded to Checkmarx GitHub Actions, OpenVSX extensions, and the LiteLLM Python library on PyPI. Twenty-eight packages were backdoored in under 60 seconds. The most security-conscious organizations, the ones scanning every build, had the greatest exposure. --- Why #Offensive #Security #Testing Matters Here This is exactly the scenario that a CI/CD-focused penetration test or supply chain #RedTeam #engagement is designed to catch before an adversary does. Testing whether GitHub Actions use mutable tags instead of SHA-pinned references, whether PATs are over-scoped and long-lived, whether credential rotation is truly atomic, and whether runner environments leak secrets to third-party code. A vulnerability scanner cannot scan for its own compromise. #Adversarial validation can. --- Immediate Actions If You Use #Trivy - Rotate every secret that was accessible to pipelines between March 19-24. - Pin all GitHub Actions to full commit SHAs. - Search your GitHub organization for tpcp-docs repositories. - Block the known C2 infrastructure at the network level. - Check developer machines for sysmon.py or pgmon services. - logisek.com #CyberSecurity #SupplyChainSecurity #RedTeam #PenTest #InfoSec #OffSec #CICD #DevSecOps #SecurityMindset #Logisek
Logisek tweet media
English
0
1
1
255
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
The Hidden Risk of "Trusted" VPNs During an #internal #penetration #test, we discovered a VLAN that led directly into a vendor’s network, allowing us to perform actions externally. No one in the client’s current IT team was aware this connection even existed, the only person who knew about the site-to-site VPN was a former #IT manager who had already retired. That site-to-site #VPN with your #vendor feels like progress. In reality, it might be the quietest way attackers walk straight into your network. Many breaches now involve third parties and trusted connections. --- The Illusion of #Trust A site-to-site VPN creates a persistent bridge between two environments. If the vendor is compromised, your network becomes the next hop. Worse, access is often too broad. A vendor supporting one system may unintentionally gain reach into critical assets. This is how lateral movement becomes trivial and ransomware spreads faster than detection. --- Where #Operations Break Down These #tunnels are not simple pipes. IPSec configurations, encryption standards, and routing rules introduce complexity that is easy to misconfigure. Visibility is also limited. You often cannot answer a simple question: what exactly did the vendor access? Add IP overlaps and unstable tunnels, and reliability becomes another hidden risk. --- When #Risk Becomes Liability A #breach through a vendor VPN is still your breach. Regulations do not care where the attacker started. Without strong auditing, proving compliance becomes difficult, especially under GDPR or similar frameworks. --- How to #Reduce the Blast Radius - Segment aggressively. Limit access to exact systems. - Adopt just-in-time VPN activation instead of permanent tunnels. - Enforce MFA everywhere. - Continuously audit access and remove orphaned accounts. - logisek.com #CyberSecurity #InfoSec #RedTeam #PenTest #OffSec #Logisek
Logisek tweet media
English
0
2
2
258
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
No Magic Pill. Only Cyber Resilience. #Healthcare is saving lives with technology. But the same systems expanding care are expanding the attack surface. Healthcare data still the most valuable on the black market. The numbers are clear. The response often is not. --- The New #Clinical Attack Surface EHRs, IoMT devices, and automated pharma lines are now prime targets. ENISA reports nearly half of healthcare incidents involve ransomware, with data breaches close behind. This is not just IT risk. It is operational disruption with real human impact. --- 💀 #Ransomware Meets Supply Chain Reality Attacks like Synnovis and HCRG show how quickly disruption scales. Double extortion is now standard. Add AI-generated phishing and accelerated exploitation, and attackers are operating faster than most defenses can respond. --- There Is No Magic Pill #Compliance with #NIS2 and #GDPR is necessary, but not sufficient. Real resilience comes from offensive security. Penetration testing, red teaming, and assumed breach scenarios expose what controls miss. Especially in legacy-heavy, high-availability environments. --- ⚙️ The Prescription That Works Zero Trust, MFA, segmentation, and strong detection capabilities are essential. But equally critical are tested response plans and people who know how to act under pressure. - Read the full article here (in Greek): itsecuritypro.gr/chapi-den-ypar… #CyberSecurity #HealthcareSecurity #RedTeam #PenTest #InfoSec #OffSec #SecurityMindset #NIS2 #DigitalResilience #Logisek
English
0
1
1
141
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
#Awareness Isn’t Enough #Cyber #threats are no longer hypothetical for #Greek businesses, they are happening here and now. Yet many organizations still feel unprepared. That gap is where attackers win. --- The Illusion of Readiness Greek organizations are not unaware of #cybersecurity risks, but awareness alone is not enough. Without execution, it creates a false sense of #security. Many businesses still lack dedicated cybersecurity expertise, while human error continues to be the most exploited vulnerability. --- ⚔️ The Real Threat Landscape #Malware, #ransomware, and #phishing dominate nearly half of all attacks. These are not random events, they are targeted, persistent, and increasingly sophisticated. Customer data is the prize, and sectors like #finance are under even greater pressure than the #European average. --- 🤖 The Shift to Proactive #Defense Traditional defenses are no longer enough. Organizations must adopt proactive strategies, continuous testing, threat simulation, and AI-driven detection. The goal is simple: identify weaknesses before attackers do. --- Organizations need to validate their security posture the same way attackers do. Regular penetration testing, adversary simulations, and continuous exposure assessments are no longer optional, they are critical for identifying real attack paths, not just theoretical risks. Controls that look strong on paper often fail under realistic conditions. Security should be measured by how effectively you can detect, respond, and contain an attack, not just prevent it. #CyberSecurity #InfoSec #RedTeam #PenTest #OffSec #CyberRisk #Logisek
Logisek tweet media
English
0
1
1
122
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
You Can't #Defend What You Don't Know Exists Your board wants risk metrics. Your team wants prioritization. Your auditors want proof. None of that is possible without one thing most organizations still get wrong: knowing what they own. Every penetration test we run starts the same way: We find assets the client forgot they had. Shadow IT, legacy servers, orphaned cloud instances. --- 🗺️ The Blind Spot That Breaks Everything #Vulnerability management, risk prioritization, #incident response: none of it works without a clear picture of what you actually own. You can't patch what you haven't inventoried. You can't monitor what you don't know is running. --- What #Attackers See That You Don't During #RedTeam #engagements, the easiest wins almost always come from forgotten assets. A decommissioned server still connected to the network. A test environment with production credentials. These aren't edge cases. They're patterns I see repeatedly across industries. --- Build a living asset inventory. Automate discovery. Assign ownership to every system, service, and endpoint. Treat asset management as a continuous process, not a one-time project. If your security strategy doesn't begin here, it's built on sand. - logisek.com #CyberSecurity #AssetManagement #PenTest #RedTeam #InfoSec #OffSec #VulnerabilityManagement #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
150
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
The #IDOR That "Isn't" a Vulnerability… Yet Many IDOR findings are dismissed with a simple argument: "No unauthorized data is exposed". Technically, that may be true today. But security isn’t about the present moment, it's about what happens when the code inevitably changes. --- What IDOR Really Exposes Insecure Direct Object Reference occurs when applications rely on user-controllable identifiers like user_id=101 in URLs or API requests without enforcing strict authorization checks. Attackers simply modify the identifier. user_id=101 → user_id=102 If the application trusts that input without validating ownership, the attacker can access or modify another user's data. This is classic horizontal privilege escalation. But here's the nuance: sometimes the access control currently blocks it. Developers see that and conclude the issue is harmless. --- ⚠️ Future Code Changes A "potential IDOR" is often a #design flaw waiting for the wrong commit. #Security logic evolves. APIs get refactored. New features reuse endpoints. The moment a #developer removes or weakens a check, intentionally or not, that latent flaw becomes a #critical Broken Access Control (#BAC) vulnerability. This is why experienced penetration testers flag it early. Not because it is exploitable today. Because the architecture allows it to become exploitable tomorrow. --- How to #Eliminate the Risk The safest approach is architectural: - Enforce server-side authorization checks for every object request. - Validate that the user owns or is authorized for the resource. - Avoid exposing direct database identifiers. - Use indirect references such as GUIDs. Security should never depend on developers remembering to add checks everywhere. It should be built into the design. - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #BrokenAccessControl #SecurityMindset #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
201
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
When #GPS Lies Most people think #CyberWarfare happens in data centers. But today, it can move a 300-meter cargo ship in the wrong direction. Modern #shipping depends almost entirely on GPS. When that signal is manipulated, reality and navigation diverge. --- 🚢 The Invisible Attack Surface at #Sea GPS works by calculating position using timing signals from satellites orbiting Earth. The problem? Those signals are incredibly weak when they reach the surface. Attackers can jam signals with #electromagnetic noise, causing navigation systems to lose position entirely. More dangerous is spoofing, broadcasting fake #satellite signals that trick receivers into calculating a false location. --- 🛰️ When Ships Start "Teleporting" In the Black Sea, vessels in 2025 appeared on tracking systems moving in perfect circles, a physical impossibility. In reality, they were hundreds of miles away. This type of GPS spoofing has also been reported in strategic chokepoints like the Strait of Hormuz and the Red Sea, where even small navigation errors can be catastrophic. A striking example: MSC Antonia (May 2025). Its navigation systems suddenly showed the ship hundreds of miles from its real position. The confused crew eventually ran the vessel aground, triggering a five-week salvage operation and millions in damages. --- ⚠️ The #Maritime Cybersecurity Gap #Warships train for this. Commercial vessels rarely do. Most crews receive #cyber #training focused on #phishing or infected USB devices, useful, but not enough when navigation systems suddenly display impossible coordinates. At the same time, ships are becoming more connected than ever through satellite internet and remote monitoring systems. More connectivity means more entry points. --- 🧭 The Lost Art of #Navigation For centuries, sailors relied on charts, stars, and instruments. Today, many commercial ships carry no paper charts and rarely train crews in celestial navigation. #Technology made navigation easier. But it also created a single point of failure. --- GPS spoofing is not just a #military tactic anymore. It is becoming a real-world cybersecurity risk affecting global supply chains, maritime safety, and the people responsible for moving 90% of the world's trade. - logisek.com #CyberSecurity #InfoSec #RedTeam #PenTest #OffSec #OffensiveSecurity #Warfare #MaritimeSecurity #Logisek
Logisek tweet media
English
0
1
1
179
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
When the Target Isn't Data, It's #Physical Safety Most penetration testers break into networks to prove they can steal data. But what happens when a successful exploit doesn't leak records, it shuts down a #power #grid, opens a valve, or halts a production line? ICS/SCADA penetration testing operates in a world where a wrong move has consequences you can feel in the real world. --- 🏭 The Convergence Problem Modern #industry runs on connectivity. #IT and #OT networks that were once air-gapped are now bridged for efficiency, remote monitoring, and #IoT integration. That convenience introduces attack surface that most organizations underestimate. Legacy #PLC running decades-old #firmware sit on the same infrastructure as corporate email. #Modbus and #DNP3 traffic flows unencrypted across flat networks. --- #Testing Without Breaking Things ICS/SCADA pentesting is not traditional pentesting with an industrial coat of paint. Every action must be deliberate, non-disruptive, and safety-aware. That means passive reconnaissance, protocol-aware scanning, and exploitation attempts carefully scoped within maintenance windows. The targets (HMIs, PLCs, RTUs) control physical processes, so the methodology prioritizes identifying weaknesses like default credentials, missing segmentation, and unpatched firmware without triggering real-world consequences. --- ⚡ What We Keep Finding Across engagements, the patterns repeat: > Flat networks with zero segmentation between IT and OT, > Default or weak passwords on critical controllers, > Legacy systems with known CVEs that will never be patched, and > Protocols that were designed for reliability, not security. --- With NIS2 enforcement tightening across #Europe and threat actors increasingly targeting critical infrastructure, #ICS/#SCADA security assessments are no longer optional. They are a business continuity requirement. Organizations that test proactively identify the gaps before an attacker converts them into downtime, safety incidents, or regulatory exposure. If your OT environment hasn't been tested by someone who understands both the protocols and the physical consequences, the question isn't whether you have vulnerabilities. It's whether you'll find them before someone else does. - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #ICS #SCADA #OTSecurity #CriticalInfrastructure #SecurityMindset #NIS2 #Logisek
Logisek tweet media
English
0
1
2
234
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
#Pentest Results Are Not the Finish Line Most pentest reports end up in a risk register. Few end up redesigning the architecture that created the risk. The problem is rarely a single vulnerability, it is the #architecture that makes the attack path possible. --- #Pentesting Is a Diagnostic, Not a Trophy A penetration test is not a checkbox. It is a diagnostic tool. #RedTeam findings reveal architectural weaknesses: misplaced trust boundaries, excessive privileges, poor segmentation, fragile identity models. Yet too often, these findings remain trapped in a PDF report. The value of a pentest is not in the #exploit chain. It is in the architectural lesson behind it. --- From Findings to #Security #Architecture Every serious finding should trigger a deeper question: Why was this possible in the first place? - Was the network overly flat? - Were identities overprivileged? - Was monitoring missing by design? True maturity means translating pentest results into: > Architecture redesign. > Hardened security policies. > Enforced baseline controls. And most importantly, applying them across all subsidiaries and environments, not just the tested one. --- 🧭 Let the #Attack Path Design the #Defense Attack paths reveal where trust is misplaced. If a pentest shows lateral movement from a workstation to domain admin in hours, the problem is not the vulnerability, it is the architecture that allowed it. Pentests should guide: * Segmentation strategy * Identity governance * Monitoring architecture * Zero trust adoption When your last pentest finished, did you just fix the findings.. or did you redesign the #architecture that allowed them? - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #SecurityArchitecture #SecurityMindset #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
236
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
The #Weakest Site Is Not the #HQ Most organizations invest heavily in securing their #headquarters. Hardened networks, regular #PenetrationTests, #SOC monitoring. But #attackers rarely walk through the front door when the back gates are wide open. --- 🏭 The Forgotten Edge of the #Enterprise Large organizations often operate through #subsidiaries, #factories, and remote operational sites. These environments are typically connected to HQ through site-to-site #VPN or #MPLS, creating what appears to be a trusted extension of the corporate network. But trust does not equal security. Many of these locations run legacy #OT systems, unmanaged devices, or infrastructure that has not been patched or reviewed in years. Limited cybersecurity budgets and operational priorities often leave them outside the main security program. To an attacker, these locations are not secondary targets. They are entry points. --- 🎯 Why Attackers Start Far From HQ Threat actors understand network topology better than many defenders assume. They know the HQ environment is hardened, monitored, and tested. So they look elsewhere. A forgotten #factory network, an outdated OT gateway, or an unpatched edge firewall can provide the foothold needed to pivot into the corporate environment through trusted connectivity. In many real incidents, the breach did not start at headquarters. It started at the least defended site. --- 🛡️ Security Must Extend to the Entire #Ecosystem If your factories, subsidiaries, and remote sites are connected to HQ, they are part of the same attack surface. #Security strategy should include: - Regular security #assessments of remote locations. - Network #segmentation between IT and OT environments. - Continuous monitoring of site-to-site connections. - #Budget allocation for cybersecurity across all operational sites. Because the question attackers ask is simple: "Which site did they forget to secure?" - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #SecurityMindset #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
150
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
#Security as a Monopoly Board What if your organization’s #security #posture could be explained through a game of #Monopoly? A #PenetrationTest often reveals that defending an environment is less about isolated #vulnerabilities and more about understanding the entire board. --- 🗺️ The Board: Your #Environment Your infrastructure is the board: networks, applications, APIs, cloud services, endpoints, and users. Each square is an asset. Web apps, servers, and accounts form different "properties", while critical systems like domain controllers or production databases become the most valuable ones. --- 🎲 #Discovery Security #teams must constantly explore the board. Asset discovery, scanning, and assessments help identify what exists and where weaknesses may appear. You cannot defend properties you do not see. --- 🏠 Protecting #Properties Attackers attempt to claim exposed assets through phishing, misconfigurations, or vulnerable services. Hardening systems, managing privileges, and monitoring activity adds defensive "houses" that strengthen your position. Penetration testing shows how an attacker could move across your board before they actually do. If your environment is the board, which properties would attackers target first today? - logisek.com #CyberSecurity #PenTest #RedTeam #InfoSec #OffSec #Logisek
Logisek tweet media
English
0
1
1
149
maldevel ☣ retweetledi
Logisek
Logisek@logisekict·
The #Pentest Is Done. Now What? You ran the pentest. The #report arrived. Pages of findings, #CVSS scores, screenshots, proof-of-concept #exploits. Now comes the part most organizations underestimate: what happens next. The pentest report isn't the finish line. It's the backlog. Across many organizations, vulnerability remediation stalls after the report is delivered. Not because teams don't care, but because prioritization, ownership, and tracking are often missing. Security fails less from lack of testing, and more from lack of follow-through. --- Findings Are Not Fixes A pentest report is not a security improvement plan. It is a diagnosis. #Vulnerabilities need to be understood in context: - What is exploitable? - What actually threatens the business? - What can realistically be abused in a real attack chain? Without prioritization, remediation becomes noise, and noise leads to inaction. --- ⚖️ #Risk Is Not a CVSS Score Not every "High" vulnerability deserves the same urgency. A medium misconfiguration exposed to the internet might matter more than a critical issue buried deep in an isolated network. The real question is: "How would an attacker actually use this?" That #mindset changes everything. --- #Security Is a Process, Not a Report The real value of a pentest appears when findings are: - Prioritized by risk. - Assigned to owners. - Tracked to remediation. - Validated after fixes. Otherwise, the report becomes just another PDF in a shared folder. Do your organization truly want pentest results, or just proof that they ran a pentest? #CyberSecurity #RedTeam #PenTest #InfoSec #OffSec #SecurityMindset #RiskManagement #OffensiveSecurity #Logisek
Logisek tweet media
English
0
1
1
173