Reading time:
~11 min
Posted
by Paul van der Haas
on
22 March 2024
TL&DR – While on an assessment, I found an instance of ReCrystallize Server. It had many problems, some of which...
Reading time:
~10 min
Posted
by Reino Mostert
on
31 May 2022
A while back, after some live music and drinks at Railways, I made my way to another city for pleasant...
Reading time:
~11 min
Posted
by Hector Cuesta
on
28 October 2019
Intro This post will try to do a small introduction to the QL language using real-world vulnerabilities that I found...
Reading time:
~16 min
Posted
by Hector Cuesta
on
02 May 2019
Categories:
Cve,
Cve-2019-0547,
Cve-2019-0726,
Dhcp,
Exploit,
Kb4480966,
Patch diffing,
Research,
Diffing,
Protocol,
Windows
This post will cover my journey into the analysis of CVE-2019-0547 (Affecting the windows DHCP client), a vulnerability discovered by...
Reading time:
~13 min
Posted
by Javier Jimenez
on
18 April 2019
Intro During an internal assessment, I came across monitoring software that had default credentials configured. This monitoring software allowed for...
Reading time:
~16 min
Posted
by Javier Jimenez
on
06 September 2018
Intro Hello there! On this part we are focusing on abusing chunk creation and heap massaging in hope of overwriting...
Reading time:
~15 min
Posted
by Javier Jimenez
on
15 March 2018
Intro (part 1) Hello and welcome to the final post of our Intro to exploitation series! We have learned the basics...
Reading time:
~15 min
Posted
by Javier Jimenez
on
22 December 2017
Intro Hello again and welcome to the third of our series. On today’s blog post we are going to see...
Reading time:
~12 min
Posted
by etienne
on
11 October 2017
Ruler has become a go to tool for us on external engagements, easily turning compromised mailbox credentials into shells. This...
Reading time:
~5 min
Posted
by saif
on
09 October 2017
Authors: Etienne Stalmans, Saif El-Sherei What if we told you that there is a way to get command execution on...
Reading time:
~21 min
Posted
by saif
on
29 July 2017
Exploiting MS17-017 EoP Using Color Palettes This post is an accompaniment to the Defcon 25 talk given by Saif. One...
Reading time:
~9 min
Posted
by Javier Jimenez
on
28 July 2017
Intro After analysing the implementation of ptmalloc2 which, is a must read if you don’t know anything about the linux userland...
Reading time:
~11 min
Posted
by Javier Jimenez
on
19 June 2017
Intro Hi there (again)! This series are going to an end as the next and feasible step is the widely...
Reading time:
~6 min
Posted
by Rogan Dawes
on
10 March 2017
Categories:
Abuse,
Backdoor,
Build-it,
Conferences,
Empire,
Exploit,
Hardware,
Internals,
Linux,
Metasploit,
Programming,
Real-world,
Research,
Shells,
Tunnelling
(If you’re new to this project, read the intro first) For the past few months, I’ve been working on porting...
Reading time:
~39 min
Posted
by saif
on
03 January 2017
Starting from the beginning with no experience whatsoever in kernel land let alone exploiting it, I was always intrigued and...