The Vilkas Wire

Insights and field notes from real-world penetration tests and security research by the experts at Vilkas.

Latest Posts

Showing 26 of 26 total posts

Common Attack Chains Enabled by Missing LDAP Signing

Common Attack Chains Enabled by Missing LDAP Signing

Learn how missing LDAP signing enables credential relay, footholds, and chained Active Directory attacks during real internal penetration…

Jan 27, 20266 min read
Read Post
The Real-World Risk of Not Enforcing SMB Signing in Internal Networks

The Real-World Risk of Not Enforcing SMB Signing in Internal Networks

How unsigned SMB traffic is abused during internal penetration tests, why “enabled but not required” still fails, and how this…

Jan 20, 20267 min read
Read Post
When Active Directory Is in Scope, Don’t Handcuff the Pentest

When Active Directory Is in Scope, Don’t Handcuff the Pentest

When Active Directory is in scope, giving your pentester a low‑privilege password is not cheating; it simulates a compromised user account…

Jan 6, 20267 min read
Read Post
You Passed the Audit. Now Pass the Attack

You Passed the Audit. Now Pass the Attack

Organizations often pass audits but still fall to basic misconfigurations and control gaps. Learn how pentesting provides the real-world…

Nov 18, 20258 min read
Read Post
 Why You Should Secure AD CS Against ESC1 (and How to Do It)

Why You Should Secure AD CS Against ESC1 (and How to Do It)

A misconfigured AD CS template (ESC1) can let any domain user escalate to Domain Admin in minutes. Learn how this common flaw works and the…

Oct 9, 20254 min read
Read Post

Want to Contribute?

Whether you're breaking down a recent pentest or reflecting on a red team engagement, we welcome your insights. Share your tactics, lessons learned, and perspectives with the community.

Learn How to Contribute