Blog
Scanning SMB shares with SMBLS
In Carve's internal engagement service line, we simulate an attacker on a corporate network, which is usually Windows-based. We use a variety of tools to gather information, but we were frustrated by...
How to get better bugs from your pentest
During scoping for penetration tests, customers often say that they want us to perform the engagement exactly as a bad actor would, with no collaboration from the customer’s IT or security teams and...
Carve Partners with iVision to Offer Comprehensive Portfolio of IT Solutions
Since Carve’s inception 10+ years ago, we have grown to be a trusted partner to some of the largest global brands, high-tech start-ups and disruptors, and mid-sized enterprises that demand world-class cybersecurity expertise and white glove service. Carve Systems will continue to operate as the cybersecurity division of iVision.
Be careful with your testing account passwords
Author: Austin Ralls One of the easiest ways Carve consultants escalate privilege is reusing a password from a low-privilege account to authenticate to a high-privilege account. It doesn't happen all...
In praise of LAPS
When performing internal tests on a company's network, one of the top priorities is compromising Windows workstations and servers. This is made much easier when local administrator accounts have the...
Three Most Common Security Mistakes Seen During AWS Application Assessments
Security is often a big concern when it comes to cloud computing. According to the Cloud Security Alliance (CSA), traditional security issues under the responsibility of cloud service providers...
Security Assessment Color Palette
There are many different types of security assessment methodologies identified by cute color associations. Here are simple descriptions of the most popular to help you choose which approach is right...
Unintentionally exposing your organization to MFA bypasses on Azure Active Directory
Some organizations may believe that they are enforcing a second authorization factor when using Microsoft Single-Sign On on Azure Active Directory, but their configuration might have an easy way to...
Secrets in Broad Daylight, or How $500,000/Year Software Can Help Hackers Compromise Your Network
You might have taken all the right steps to secure a corporate Windows workstation: your users are not running as local admins, endpoint protection is in place, service ACLs and file permissions are...
An Easy Cybersecurity Model for Busy Execs
Do you know what your organization's attack surface is? Attack surface is everything that a bad person (aka “attacker”) can interact with or touch. Your organization’s attack surface consists of PIA:...