Mac OS Guide

Mac OS Guide Desktop Hypervisor Using a desktop hypervisor such as VirtualBox, VMware, or Parallels allows better functionality and more advanced control. This enables choosing the Operating System (OS) to use as a docker host by running a Virtual Machine (VM) within...

NodeZero Deployment Options

NodeZero Deployment Options BLUF: Where you setup your NodeZero host—your operation launch point—matters. Before setting up your NodeZero host, you need to decide what you want to learn from the operation. The following are a few options you may find helpful in making...

API Guide

API Guide The Horizon3.ai API provides programmatic access to a subset of functionality available through the Horizon3.ai portal. At a a high level, this API allows for: scheduling an autonomous pentest monitoring the status of a pentest while it is running retrieving...

Scoring Matrix

Scoring Matrix Critical (9.0 – 10.0) Vulnerabilities that score in the critical range usually have most of the following characteristics: Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices. Exploitation...

Inject Credentials

Inject Credentials NodeZero operates like an unauthenticated attacker (black box), enumerating and exploiting what it finds to build a true attacker’s perspective of your risk. However…if you’d like to see how far an attacker can get when compromising a...

Man-in-the-Middle attacks & Cyanide

Man-in-the-Middle attacks & Cyanide What does Cyanide do? Cyanide utilizes an opportunistic attack and combines Impacket’s ntlmrelayx.py along with poisoners (e.g. Responder) in order to correlate: Who Cyanide will provide information of who the user or service...