• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From netspi.com

CVE-2025-21299: Unguarding Microsoft Credential Guard

0 0

Learn more about the January 2025 Patch Tuesday that addresses a critical vulnerability where Kerberos canonicalization flaws allow attackers to bypass Virtualization Based Security and extract protected TGTs from Windows systems.

on Apr 16

From netspi.com

CVE-2025-27590 – Oxidized Web: Local File Overwrite to Remote Code Execution

0 0

Learn about a critical security vulnerability (CVE-2025-27590) in Oxidized Web v0.14 that allows attackers to overwrite local files and execute remote code execution.

on Apr 10

From netspi.com

15 Ways to Bypass the PowerShell Execution Policy

0 0

NetSPI security expert Scott Sutherland covers 15 ways to bypass the PowerShell execution policy without having local administrator rights on the system.

on Apr 8

From netspi.com

Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

0 0

Abusing Storage Account Permissions to attack Azure Machine Learning notebooks

on Jan 8

From netspi.com

Exploiting Second Order SQL Injection with Stored Procedures

0 0

Learn how to detect and exploit second-order SQL injection vulnerabilities using Out-of-Band (OOB) techniques, including leveraging DNS requests for data extraction.

on Dec 26

From netspi.com

An Approach to Bypassing Mail Filters

0 0

By “nulling” the first one or two bytes of a docm file, some spam filters will allow a malicious document to be delivered despite being explicitly blocked. A number of vendors have independently verified this bypass as an issue. While macro-enabled documents were the focus of our testing, the...

on Dec 3

From netspi.com

Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0

0 0

Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.

on Nov 15

From netspi.com

Filling up the DagBag: Privilege Escalation in Google Cloud Composer

0 0

Learn how attackers can escalate privileges in Cloud Composer by exploiting the dedicated Cloud Storage Bucket and the risks of default configurations.

on Nov 6

From netspi.com

Hacking CICS: 7 Ways to Defeat Mainframe Applications

0 0

Explore how modern penetration testing tools uncover vulnerabilities in mainframe applications, highlighting the need for methodical techniques and regular testing to protect these critical systems from threats.

on Oct 25

From netspi.com

Mapping Mainframe Memory Made Easy

0 0

Explore how NetSPI's own LPAR enhances pentesting efficiency through rapid tool prototyping and deployment.

on Sep 16

From netspi.com

Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation 

0 0

Learn how threat actors can exploit SQL Server credential objects to escalate domain privileges and how you can detect it.

on Sep 10

From netspi.com

An Introduction to GCPwn – Part 1

0 1

GCPwn is a pentesting tool. Learn about credential management, launching modules, permissions (including testIamPermissions), and final notes.

on Sep 3

From netspi.com

Escalating Privileges in Google Cloud via Open Groups 

0 0

Learn how attackers can abuse Open groups to potentially escalate privileges in Google Cloud and how to detect these attack paths.

on Aug 4

From netspi.com

Exploiting a Generative AI Chatbot – Prompt Injection to Remote Code Execution (RCE)

0 0

Discover how NetSPI exploits an externally exposed Generative AI Chatbot to compromise the hosting server.

on Jul 16

From netspi.com

Prototype Pollution: A Deep-Dive

0 0

Learn about Prototype Pollution – what it is, why it exists, and real examples of how it can be exploited.

on Jun 28

From netspi.com

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

0 0

Learn how NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects.

on Jun 17

From netspi.com

CackalackyCon

0 0

Join NetSPI Director, Mainframe Penetration Testing Phil Young in Durham, NC to learn how to find and exploit local buffer overflows.

on May 14

From netspi.com

Elevating Privileges with Azure Site Recovery Services

0 0

Discover how NetSPI uncovered and reported a Microsoft-managed Azure Site Recovery service vulnerability and how the finding was remediated.

on Apr 1, 2024

From netspi.com

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

0 0

Learn how NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects.

on Mar 11, 2024