HOW SAFE IS YOUR DATA?
// OUR SERVICES
Assess
Build
Teach
// LATEST NEWS
Configuring Metasploit and Empire to Catch Shells behind an Nginx Reverse Proxy
During red team engagements, we've found ourselves in the situation of wanting to use multiple remote access tools (Metasploit, Empire, Cobalt Strike, etc), all over port 443 for HTTPS communications. This is common when the only egress method from a network is...
Taking Local File Disclosure to the Next Level
I recently discovered a path traversal vulnerability on a bash script exposed through the cgi-bin directory on an Apache server. Using the vulnerability, I was able to read arbitrary files on the remote system (as long as the access controls of the Apache user allowed...
Deserialisation Vulnerabilities
Seemingly one of the most overlooked security vulnerabilities in the web applications that we test is the deserialization of untrusted data. I say overlooked because awareness of this issue seems to be comparatively low among web developers. Contrast that with the...