Man-in-the-Middle attacks & Cyanide

Man-in-the-Middle attacks & Cyanide What does Cyanide do? Cyanide utilizes an opportunistic attack and combines Impacket’s ntlmrelayx.py along with poisoners (e.g. Responder) in order to correlate: Who Cyanide will provide information of who the user or service...

Inject Credentials

Inject Credentials NodeZero operates like an unauthenticated attacker (black box), enumerating and exploiting what it finds to build a true attacker’s perspective of your risk. However…if you’d like to see how far an attacker can get when compromising a...

Scoring Matrix

Scoring Matrix Critical (9.0 – 10.0) Vulnerabilities that score in the critical range usually have most of the following characteristics: Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices. Exploitation...

API Guide

API Guide The Horizon3.ai API provides programmatic access to a subset of functionality available through the Horizon3.ai portal. At a a high level, this API allows for: scheduling an automated pentest, known as an operation monitoring the status of the operation...

NodeZero Deployment Options

NodeZero Deployment Options BLUF: Where you setup your NodeZero host—your operation launch point—matters. Before setting up your NodeZero host, you need to decide what you want to learn from the operation. The following are a few options you may find helpful in making...

Mac OS Guide

Mac OS Guide There are two supported options for running NodeZero on macOS: 1. Desktop Hypervisor (Recommended) Using a desktop hypervisor such as VirtualBox, VMware, or Parallels allows better functionality and more advanced control. This enables choosing the...