There was a consulting request from the client company for the AD security policy. AD security policy can be seen from various points of view from design of AD to account management, but since the total number of accounts is over 100,000, this consulting focused on identifying the latest issue, abnormal account, and suggesting improvement plan.
read moreMost of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerability diagnostics. Most of them are static diagnosis using a tool for diagnosing source vulnerabilities such as Fortify and dynamic ....
read more* There are many purposes to hide your IP. - When Google pulled out of China, there were a lot of Chinese who used public VPNs to bypass blocking - There is a situation where you have to hide your IP inevitably in order to execute Real PT composed of Red Team - It may be used to bypass the blocked IP itself while diagnosing security vulnerabilities
read more