Monster Lurking in Hidden Excel Worksheet

A recent blog by Didier Steven’s showed how malicious Excel 4 macros can be stored in OOXML (Office ...

Read More

Windows Debugging and Exploiting Part 4: NTQuerySystemInformation

Introduction Hello again! We are back with more Windows internals and it's time to get real. We ...

Read More

RATs Wrapped and Hidden in PNG

The Remote Access Tool (RAT) is one of the malware types we often encounter with our Security Email ...

Read More

Phishing in the Cloud

Credential phishing is one of the leading threats faced by organizations today. Threat actors use ...

Read More

Multiple Phishing Attacks Discovered Using the Coronavirus Theme

It’s out there in the newspaper, social media, and television headlines. The Coronavirus (aka ...

Read More

Patch Tuesday February 2020

February's Patch Tuesday is here and brings with it patches for 98 CVEs. These are split between 13 ...

Read More

Reversing (and Recreating) Cryptographic Secrets Found in .NET Assemblies Using Python

Picture the scene - you’re on a penetration test, somehow you’ve got hold of a bunch of .NET ...

Read More

Microsoft Internet Explorer Remote Code Execution 0-Day (CVE-2020-0674)

2020 is not starting out quietly for Microsoft, it seems. After the first Patch Tuesday of 2020 ...

Read More

ModSecurity Denial of Service Details - CVE-2019-19886

ModSecurity is an open-source WAF engine maintained by Trustwave. As a lively open-source project, ...

Read More

Windows CryptoAPI Spoofing Vulnerability - CVE-2020-0601

One of the most notable vulnerabilities patched during Microsoft's first Patch Tuesday of 2020 was ...

Read More

Citrix ADC/Netscaler - CVE-2019-19781

The Citrix vulnerability (CVE-2019-19781) was first identified in December of 2019. This ...

Read More

Patch Tuesday, January 2020

Happy 2020! Microsoft is helping you celebrate the new decade with patches for 49 CVEs. Of those ...

Read More

ModSecurity v3.0.4 Released!

It is a pleasure to announce the release of ModSecurity version 3.0.4 (libModSecurity). This ...

Read More

Windows Debugging & Exploiting Part 3: WinDBG Time Travel Debugging

Introduction Hi, my fellow friends! How are you? Hopefully, you had a terrific holiday and much ...

Read More

Using the InterPlanetary File System For Offensive Operations

Introduction In this blog post, I intend to provide some insight into using the InterPlanetary File ...

Read More

Leveraging Disk Imaging Tools to Deliver RATs

This year we observed a notable uptick in disc imaging software (like .ISO) being used as a ...

Read More

Undressing the REvil

Contributors: Lloyd Macrohon and Rodel Mendrez

Read More

Anyone Can Check for Magecart with Just the Browser

In the past, there have been plenty of articles and blog posts recommending the use of Content ...

Read More

Typosquatting in Python Repositories

Python's popularity is amazing and constantly growing. For the first time, Python has overtaken ...

Read More

Patch Tuesday, December 2019

December's Patch Tuesday is upon us, and, as in years gone by, it's a rather light month. All told ...

Read More

SCshell: Fileless Lateral Movement Using Service Manager

During red team engagements, lateral movement in a network is crucial. In addition, as a critical ...

Read More

CVE-2019-1429: (Another) Microsoft Internet Explorer 0-Day

November’s Patch Tuesday from Microsoft included a patch for yet another Internet Explorer 0-day, ...

Read More

Introducing Password Cracking Manager: CrackQ

Today we are releasing CrackQ, a queuing system to manage password cracking that I've been working ...

Read More

Time Windows for Penetration Testing

Often when penetration tests are scheduled, it will be requested that testing occurs during ...

Read More

CVE-2019-15652: SatLink VSAT Vulnerabilities

Back in May of this year, I discovered a few vulnerabilities in the SatLink 2000 VSAT modem, which ...

Read More

Fake Windows Update Spam Leads to Cyborg Ransomware and Its Builder

Recently, fake Microsoft Windows Update emails were spammed with the following subject lines: ...

Read More

Windows Debugging & Exploiting Part 2 - WinDBG 101

Introduction Hello again! After our previous post about the environment setup, now it is time to ...

Read More

Fingerprinting FreeBSD OS Versions using OpenSSH

In the past, we’ve described how to fingerprint Ubuntu OS Version using OpenSSH. This time, I’ll ...

Read More