<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/vendor/feed/atom.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US">
                        <id>https://naunet.eu/feed</id>
                                <link href="https://naunet.eu/feed" rel="self"></link>
                                <title><![CDATA[New blog posts on naunet.eu]]></title>
                    
                                <subtitle>Subscribe to our RSS feed to stay informed and secure!</subtitle>
                                                    <updated>2026-04-02T06:34:26+00:00</updated>
                        <entry>
            <title><![CDATA[OpenClaw: When a “helpful assistant” becomes an attack surface]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/11" />
            <id>https://naunet.eu/11</id>
            <author>
                <name><![CDATA[Mate Torok]]></name>
            </author>
            <summary type="html">
                <![CDATA[OpenClaw is an open source AI assistant that runs on your machine and connects to chat apps like Telegram, Discord, and Slack. It is useful because it collapses message intake, web access, tool invocation, and stored authority into one runtime. These features make it a very inviting application however that is also the core danger.]]>
            </summary>
                                    <updated>2026-04-02T06:34:26+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[How to use Evilginx 3 with Custom Certificates]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/9" />
            <id>https://naunet.eu/9</id>
            <author>
                <name><![CDATA[Bence Szabo]]></name>
            </author>
            <summary type="html">
                <![CDATA[Two ways to use Evilginx 3 community edition with custom (even wildcard) certificates.]]>
            </summary>
                                    <updated>2025-07-01T08:44:00+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[Stealthier than Nmap: ShadowProbe]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/8" />
            <id>https://naunet.eu/8</id>
            <author>
                <name><![CDATA[Bence Szabo]]></name>
            </author>
            <summary type="html">
                <![CDATA[ShadowProbe is a custom-made, TCP-only port scanner designed for multiple targets, featuring an inbuilt scheduler. It is a tool intended to run for days or even weeks once started.]]>
            </summary>
                                    <updated>2025-04-28T09:38:16+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[How Not to Land in SPAM During Your Phishing Campaign]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/7" />
            <id>https://naunet.eu/7</id>
            <author>
                <name><![CDATA[Bence Szabo]]></name>
            </author>
            <summary type="html">
                <![CDATA[Last year, I conducted a phishing campaign as part of a red team assessment. Let me share what I learned about SPAM filters. I also had access to the internal mailing system, allowing me to test my theories on the target.]]>
            </summary>
                                    <updated>2025-05-15T13:13:50+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[LegolAD: A Stealthier Approach to Active Directory Enumeration for Red Teams]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/6" />
            <id>https://naunet.eu/6</id>
            <author>
                <name><![CDATA[Bence Szabo]]></name>
            </author>
            <summary type="html">
                <![CDATA[LegolAD is an enumeration tool that allows configurable network traffic for LDAP requests in Active Directory. It can be configured for scope, pagination, and jitter. The idea behind it was to evade detection by custom monitoring systems.]]>
            </summary>
                                    <updated>2025-04-22T11:57:04+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[Effective Penetration Testing - Matching Business Needs with the Right Approach]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/4" />
            <id>https://naunet.eu/4</id>
            <author>
                <name><![CDATA[Naunet]]></name>
            </author>
            <summary type="html">
                <![CDATA[In this article, we’ll explore the different types of penetration tests—compliance-driven, penetration testing as a service (PTaaS), and threat-led testing. We’ll discuss when and why each type is necessary, who benefits from them, and how to determine the best option for your organization’s specific security needs.]]>
            </summary>
                                    <updated>2025-04-04T10:20:27+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[AIMS eCrew Authorization Bypass (CVE-2024-44450)]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/3" />
            <id>https://naunet.eu/3</id>
            <author>
                <name><![CDATA[Norbert Bajko]]></name>
            </author>
            <summary type="html">
                <![CDATA[Access control vulnerabilities are still the most common problems in web applications. This blog post summarizes several access control issues we found in our target web application.]]>
            </summary>
                                    <updated>2025-03-25T16:45:44+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[Email Security – Part 1: The Fundamentals of SPF, DKIM, and DMARC]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/2" />
            <id>https://naunet.eu/2</id>
            <author>
                <name><![CDATA[Norbert Bajko]]></name>
            </author>
            <summary type="html">
                <![CDATA[Email remains the primary attack vector for phishing and ransomware, making robust authentication essential for protecting organizations. This article introduces SPF, DKIM, and DMARC—three key technologies that help verify sender identity, prevent spoofing, and enhance email security.]]>
            </summary>
                                    <updated>2025-02-27T12:16:30+00:00</updated>
        </entry>
            <entry>
            <title><![CDATA[Configuring Burp Suite for Testing Vaadin-based Applications]]></title>
            <link rel="alternate" href="https://naunet.eu/blog/1" />
            <id>https://naunet.eu/1</id>
            <author>
                <name><![CDATA[Norbert Bajko]]></name>
            </author>
            <summary type="html">
                <![CDATA[Vaadin-based applications rely on synchronization values to maintain UI state. During security testing, missing or incorrect values can terminate sessions, making automated scans ineffective. This article explores how to navigate these challenges using Burp Suite.]]>
            </summary>
                                    <updated>2025-02-10T10:05:47+00:00</updated>
        </entry>
    </feed>
