Reversing (and Recreating) Cryptographic Secrets Found in .NET Assemblies Using Python
Picture the scene - you’re on a penetration test, somehow you’ve got hold of a bunch of .NET ...
Read MorePicture the scene - you’re on a penetration test, somehow you’ve got hold of a bunch of .NET ...
Read More2020 is not starting out quietly for Microsoft, it seems. After the first Patch Tuesday of 2020 ...
Read MoreModSecurity is an open-source WAF engine maintained by Trustwave. As a lively open-source project, ...
Read MoreOne of the most notable vulnerabilities patched during Microsoft's first Patch Tuesday of 2020 was ...
Read MoreThe Citrix vulnerability (CVE-2019-19781) was first identified in December of 2019. This ...
Read MoreHappy 2020! Microsoft is helping you celebrate the new decade with patches for 49 CVEs. Of those ...
Read MoreIt is a pleasure to announce the release of ModSecurity version 3.0.4 (libModSecurity). This ...
Read MoreIntroduction Hi, my fellow friends! How are you? Hopefully, you had a terrific holiday and much ...
Read MoreIntroduction In this blog post, I intend to provide some insight into using the InterPlanetary File ...
Read MoreThis year we observed a notable uptick in disc imaging software (like .ISO) being used as a ...
Read MoreIn the past, there have been plenty of articles and blog posts recommending the use of Content ...
Read MorePython's popularity is amazing and constantly growing. For the first time, Python has overtaken ...
Read MoreDecember's Patch Tuesday is upon us, and, as in years gone by, it's a rather light month. All told ...
Read MoreDuring red team engagements, lateral movement in a network is crucial. In addition, as a critical ...
Read MoreNovember’s Patch Tuesday from Microsoft included a patch for yet another Internet Explorer 0-day, ...
Read MoreToday we are releasing CrackQ, a queuing system to manage password cracking that I've been working ...
Read MoreOften when penetration tests are scheduled, it will be requested that testing occurs during ...
Read MoreBack in May of this year, I discovered a few vulnerabilities in the SatLink 2000 VSAT modem, which ...
Read MoreRecently, fake Microsoft Windows Update emails were spammed with the following subject lines: ...
Read MoreIntroduction Hello again! After our previous post about the environment setup, now it is time to ...
Read MoreIn the past, we’ve described how to fingerprint Ubuntu OS Version using OpenSSH. This time, I’ll ...
Read MoreOne of the unfortunate parts of a business like ours is when disputes arise from penetration ...
Read MoreMost malware sent via emails is packaged in archives such as ZIP, RAR, and 7z (7-Zip). ...
Read MoreIntroduction In this blog series, I will try to set some base knowledge for Windows system ...
Read MoreAs we mentioned in our earlier blog, Azorult is very popular in the underground hacking forum. ...
Read MoreIn this blog series, we dive into an information stealing Trojan called Azorult that we analyzed ...
Read MoreMicrosoft’s security update for the month of October is one of the lightest patch Tuesdays of the ...
Read More