Robotic-Process-Automation-Cybersecurity

RPA (Robotic Process Automation) Use Cases (Part 3)

Robotic Process Automation Cybersecurity Robotic Process Automation Cybersecurity Use cases to apply robotics in cybersecurity There are several opportunities to leverage robotics to enhance your digital strategy, as well as improve security operations. 1.1  Cybersecurity domain Illustrative use case Governance Security program: Robotics can help security reporting quality, timeliness and throughput. For example, automated, periodic […]

Securing-Auditing-Remote-Process-Automation

Securing and Auditing RPA (Remote Process Automation) Environment (Part 2)

Securing and Auditing Remote Process Automation Securing and Auditing Remote Process Automation 1. Securing RPA: RPA introduces a new attack surface that can be leveraged to disclose, steal, destroy or modify sensitive data and/or high-value information, access unauthorized applications and systems, and exploit vulnerabilities to gain further access to an organization. This section focusses on […]

Implementing-Cybersecurity-in-Robotics

Implementing and Auditing Cyber Security in Robotics (Part – 1)

Implementing Cybersecurity in Robotics Introduction: As technology and human intelligence are evolving, new products are being developed by humans. But the evolution comes with benefits and drawbacks. One of the new and evolving technology is related to Robots and robotic process automation. An increase in cyber-attacks, combined with the shift toward automating business processes using […]

Exploiting Buffer Overflow Using Return to Libc

Introduction Recently while solving a challenge on Vulnhub.com, I came across a machine called “Jigsaw: 1” At the stage of privilege escalation, a buffer overflow challenge was presented. While researching on how this can be exploited, I came across an interesting method of buffer overflow exploitation called “Return to Libc”. While many of the online […]

SSL Pinning: Introduction & Bypass for Android

SSL Pinning: Introduction & Bypass for Android What is SSL Pinning ? SSL pinning allows the application to only trust the valid or pre-defined certificate or Public Key. The application developer uses SSL pinning technique as an additional security layer for application traffic. As normally, application trusts custom certificate and allows application to intercept the […]

LLMNR/NBT-NS Poisoning in Windows environment

LLMNR/NBT-NS Poisoning In this blogpost, we’ll talk about poisoning name services (such as LLMNR, NBT-NS) within local networks. In a local area network, you can do name server poisoning to steal authentication credentials. Introduction:- LLMNR stands for -> Link-Local Multicast Name Resolution NBT-NS stands for -> NetBIOS Name Service LLMNR and NBT-NS are Microsoft Windows […]

RBI Guidelines for Tokenization

Tokenization RBI Guidelines Tokenization RBI Guidelines RBI Releases Guidelines on Tokenization for Card Transactions Reserve Bank of India has issued a directive under Section 10 (2) read with Section 18 of Payment and Settlement Systems Act, 2007 to permit authorized payment networks to offer tokenization services to any token requestor in payment card transactions, subject […]

Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment

Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things would be pretty different. In this post, we will be focusing on Evading Antivirus and covering the following topics: Creating a Simulated Environment using Windows Active Directory, DNS, Proxy and Firewall. Writing C/C++ code for […]