From netspi.com
CVE-2025-21299: Unguarding Microsoft Credential Guard
0 0
Learn more about the January 2025 Patch Tuesday that addresses a critical vulnerability where Kerberos canonicalization flaws allow attackers to bypass Virtualization Based Security and extract protected TGTs from Windows systems.
on Apr 16
From netspi.com
CVE-2025-27590 – Oxidized Web: Local File Overwrite to Remote Code Execution
0 0
Learn about a critical security vulnerability (CVE-2025-27590) in Oxidized Web v0.14 that allows attackers to overwrite local files and execute remote code execution.
on Apr 10
From netspi.com
15 Ways to Bypass the PowerShell Execution Policy
0 0
NetSPI security expert Scott Sutherland covers 15 ways to bypass the PowerShell execution policy without having local administrator rights on the system.
on Apr 8
From netspi.com
Hijacking Azure Machine Learning Notebooks (via Storage Accounts)
0 0
Abusing Storage Account Permissions to attack Azure Machine Learning notebooks
on Jan 8
From netspi.com
Exploiting Second Order SQL Injection with Stored Procedures
0 0
Learn how to detect and exploit second-order SQL injection vulnerabilities using Out-of-Band (OOB) techniques, including leveraging DNS requests for data extraction.
on Dec 26
From netspi.com
An Approach to Bypassing Mail Filters
0 0
By “nulling” the first one or two bytes of a docm file, some spam filters will allow a malicious document to be delivered despite being explicitly blocked. A number of vendors have independently verified this bypass as an issue. While macro-enabled documents were the focus of our testing, the...
on Dec 3
From netspi.com
Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0
0 0
Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.
on Nov 15
From netspi.com
Filling up the DagBag: Privilege Escalation in Google Cloud Composer
0 0
Learn how attackers can escalate privileges in Cloud Composer by exploiting the dedicated Cloud Storage Bucket and the risks of default configurations.
on Nov 6
From netspi.com
Hacking CICS: 7 Ways to Defeat Mainframe Applications
0 0
Explore how modern penetration testing tools uncover vulnerabilities in mainframe applications, highlighting the need for methodical techniques and regular testing to protect these critical systems from threats.
on Oct 25
From netspi.com
Mapping Mainframe Memory Made Easy
0 0
Explore how NetSPI's own LPAR enhances pentesting efficiency through rapid tool prototyping and deployment.
on Sep 16
From netspi.com
Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation
0 0
Learn how threat actors can exploit SQL Server credential objects to escalate domain privileges and how you can detect it.
on Sep 10
From netspi.com
An Introduction to GCPwn – Part 1
0 1
GCPwn is a pentesting tool. Learn about credential management, launching modules, permissions (including testIamPermissions), and final notes.
on Sep 3
From netspi.com
Escalating Privileges in Google Cloud via Open Groups
0 0
Learn how attackers can abuse Open groups to potentially escalate privileges in Google Cloud and how to detect these attack paths.
on Aug 4
From netspi.com
Exploiting a Generative AI Chatbot – Prompt Injection to Remote Code Execution (RCE)
0 0
Discover how NetSPI exploits an externally exposed Generative AI Chatbot to compromise the hosting server.
on Jul 16
From netspi.com
Prototype Pollution: A Deep-Dive
0 0
Learn about Prototype Pollution – what it is, why it exists, and real examples of how it can be exploited.
on Jun 28
From netspi.com
CVE-2024-21378 — Remote Code Execution in Microsoft Outlook
0 0
Learn how NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects.
on Jun 17
From netspi.com
0 0
Join NetSPI Director, Mainframe Penetration Testing Phil Young in Durham, NC to learn how to find and exploit local buffer overflows.
on May 14
From netspi.com
Elevating Privileges with Azure Site Recovery Services
0 0
Discover how NetSPI uncovered and reported a Microsoft-managed Azure Site Recovery service vulnerability and how the finding was remediated.
on Apr 1, 2024
From netspi.com
CVE-2024-21378 — Remote Code Execution in Microsoft Outlook
0 0
Learn how NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects.
on Mar 11, 2024