Escalate Privileges by Bypassing UAC

Escalate Privileges by Bypassing UAC

The Bypass UAC Injection Exploit Module Become A "God" Level User In A Few Simple Steps Quintius Walker 5 June 2017 Raise your hand if you believe that once you've gotten a remote "administrator" session on a compromised host that you're pretty much able to rock N'...

read more
Honoring InfoSec’s Fallen Soldiers

Honoring InfoSec’s Fallen Soldiers

28 MAY, 2017       Grey Hat Developer In this world, we all have someone who's presence no longer manifest itself to us in the form that we once knew it to be. This Memorial Day I'd like to take the time to honor one of InfoSec's fallen soldiers. In this post I just...

read more
What’s Beef? BeEF is when I see you

What’s Beef? BeEF is when I see you

Today the enemy has a name for me-Target 23 MAY, 2017 Grey Hat Developer In a space that's on constant alert for a nasty ransomware attack, the ninja looks past the hardened network perimeter and the client system, and walks straight through the open door- the web...

read more
Theoretical Facebook Authentication Attack Vector

Theoretical Facebook Authentication Attack Vector

19 January, 2017 Grey Hat Developer Are you familiar with the Theoretical Facebook Authentication Attack Vector? Well, in this post we're going to look at a theoretical attack vector using Facebook notifications sent to one's email address. Update: Since the date that...

read more
Performing Automated Reconnaissance with Sparta

Performing Automated Reconnaissance with Sparta

Automated Reconnaissance with Sparta Grey Hat Developer 16 January 2017 As a security tester you should ensure that you understand a tool before using it in an actual security test. Some tools may return information that is out of scope, or out of agreed upon terms of...

read more
Your Anti-Virus Software Won’t Save You

Your Anti-Virus Software Won’t Save You

Your Anti-Virus software won't save you Grey Hat Developer 18 December 2016 You ever start your computer and have a message waiting for you that's from your anti-virus program that says something along the lines of "You are protected...everything is up to date"? If...

read more
Scanning and Exploiting the Purposely Vulnerable

Scanning and Exploiting the Purposely Vulnerable

Vulnerable on Purpose Part 2- Scanning and Exploiting 9 DECEMBER, 2016 Grey Hat Developer In this post we're not only going to do some more scanning but we're also going to do some more exploiting of our target just to get a bit more familiar with running exploits...

read more
Vulnerable On Purpose: An Introduction to Metasploitable

Vulnerable On Purpose: An Introduction to Metasploitable

Because attacking live systems is never a good idea Your enemy has the same weaknesses as you do In our last post we did some scanning and enumerating on a target so you're already familiar with that process and how all of it works. Now we're going to look at it from...

read more
“Wax on, wax off.”- Getting to know your target

“Wax on, wax off.”- Getting to know your target

Brick by brick the patient thief carries away the rich man's house in a single night Thus far we've covered a lot of stuff that, admittedly, may not have seemed fun nor sexy. In the initial learning stages of getting to know your target, any of it rarely is. But trust...

read more
Scanning and Enumerating: Secrets Bleed Like Blood

Scanning and Enumerating: Secrets Bleed Like Blood

It is widely held that the Romans successfully built their own novice navy into a formidable fighting force after capturing and "reverse-engineering" a Carthaginian warship that had run aground. This would be not only yet another example of how "chance favors the...

read more

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This