Reading time:
~23 min
Posted
by guilhem.rioux@orangecyberdefense.com
on
20 June 2024
Introduction GLPI is a popular software used by companies, mainly in France. GLPI is usually used for two main purposes....
Reading time:
~20 min
Posted
by claire.vacherot@orangecyberdefense.com
on
30 May 2024
Inside industrial systems (also known as Operational Technology, or OT), devices communicate with each other and can be accessed over...
Reading time:
~30 min
Posted
by Jacques Coertze
on
24 January 2023
On a recent internal assessment, we ran into a problem. While holding low-privileged access to an internal Windows host, we...
Reading time:
~10 min
Posted
by Hector Cuesta
on
26 March 2020
Introduction Recently, I encountered a fully password-less environment. Every employee in this company had their own smart card that they...
Reading time:
~16 min
Posted
by Hector Cuesta
on
02 May 2019
Categories:
Cve,
Cve-2019-0547,
Cve-2019-0726,
Dhcp,
Exploit,
Kb4480966,
Patch diffing,
Research,
Diffing,
Protocol,
Windows
This post will cover my journey into the analysis of CVE-2019-0547 (Affecting the windows DHCP client), a vulnerability discovered by...
Reading time:
~12 min
Posted
by Leon Jacobs
on
24 October 2018
or DNS exfiltration over DNS over HTTPS (DoH) with godoh “Exfiltration Over Alternate Protocol” techniques such as using the Domain...
Reading time:
~5 min
Posted
by Leon Jacobs
on
12 March 2018
In late Jan, someone opened an Github issue in the objection repository about Android 7’s Network Security Configuration. The issue...
Reading time:
~10 min
Posted
by saif
on
06 April 2017
Whilst on a Red Team assessment back in 2015, we were faced with a tough Data Leak Protection (DLP) and...
Reading time:
~7 min
Posted
by etienne
on
22 March 2017
Getting access to an internal network is always great, keeping this access can be a whole other challenge. At times we...
Reading time:
~6 min
Posted
by Rogan Dawes
on
10 March 2017
Categories:
Abuse,
Backdoor,
Build-it,
Conferences,
Empire,
Exploit,
Hardware,
Internals,
Linux,
Metasploit,
Programming,
Real-world,
Research,
Shells,
Tunnelling
(If you’re new to this project, read the intro first) For the past few months, I’ve been working on porting...
Reading time:
~39 min
Posted
by saif
on
03 January 2017
Starting from the beginning with no experience whatsoever in kernel land let alone exploiting it, I was always intrigued and...
Reading time:
~8 min
Posted
by chris
on
01 December 2016
In this blog post I am going to describe a new tool (Rattler) that I have been working on and...
Reading time:
~13 min
Posted
by chris
on
03 October 2016
This blog post describes a method for backdooring Android executables. After describing the manual step, I will show how to...
Reading time:
~6 min
Posted
by saif
on
20 May 2016
aka Exploiting MS16-032 via Excel DDE without macros. The modified exploit script and video are at the end. A while...
Reading time:
~2 min
Posted
by Paul
on
19 March 2016
Often gaining access to a network is just the first step for a targeted attacker. Once inside, the goal is...
Reading time:
~10 min
Posted
by vlad
on
19 February 2016
A few days ago I was asked to have a look at the newly emerged crypto-ransomware threat “Locky” which utilises Dridex-like Command and Control...
Reading time:
~4 min
Posted
by stuart
on
11 January 2016
Collecting and performing Open Source Intelligence (OSINT) campaigns from a wide array of public sources means ensuring your sources contain...
Reading time:
~1 min
Posted
by Paul
on
11 December 2015
When doing internals, usually an easy first step is to use Responder and wait to retrieve NTLM hashes, cracking them and...
Reading time:
~18 min
Posted
by saif
on
23 October 2015
“Operating system facilities, such as the kernel and utility programs, are typically assumed to be reliable. In our recent experiments,...
Reading time:
~5 min
Posted
by saif
on
13 July 2015
Wireless: it’s everywhere these days and yet owning it never gets boring. As part of our annual SensePost hackathon, where...
Reading time:
~5 min
Posted
by glenn
on
13 June 2014
Friday the 13th seemed like as good a date as any to release Snoopy 2.0 (aka snoopy-ng). For those in...
Reading time:
~7 min
Posted
by daniel
on
07 April 2014
What originally started as one of those “hey, wouldn’t this be cool?” ideas, has blossomed into a yearly event for us...
Reading time:
~4 min
Posted
by siavosh
on
17 January 2014
Aah, January, a month where resolutions usually flare out spectacularly before we get back to the couch in February. We’d...
Reading time:
~1 min
Posted
by behrang
on
19 August 2013
We are publishing the research paper and tool for our BlackHat 2013 USA talk on the Z-Wave proprietary wireless protocol...
Reading time:
~8 min
Posted
by behrang
on
12 April 2013
A cloud storage service such as Microsoft SkyDrive requires building data centers as well as operational and maintenance costs. An alternative approach...
Reading time:
~17 min
Posted
by glenn
on
25 September 2012
At this year’s 44Con conference (held in London) Daniel and I introduced a project we had been working on for...
Reading time:
~1 min
Posted
by behrang
on
10 September 2012
Today’s smart cards such as banking cards and smart corporate badges are capable of running multiple tiny applications which are...
Reading time:
~4 min
Posted
by behrang
on
24 May 2012
There has been a healthy reaction to our initial post on our research into the RSA SecureID Software Token. A...
Reading time:
~7 min
Posted
by behrang
on
17 May 2012
Widespread use of smart phones by employees to perform work related activities has introduced the idea of using these devices...
Reading time:
~1 min
Posted
by saurabh
on
01 November 2011
This week, Charl van der Walt and I (Saurabh) spoke at Mobile Security Summit organized by IIR (http://www.iir.co.za/detail.php?e=2389). Charl was...
Reading time:
~2 min
Posted
by behrang
on
14 September 2011
Runtime analysis is an integral part of most application security assessment processes. Many powerful tools have been developed to perform...
Reading time:
~2 min
Posted
by glenn
on
13 September 2011
I gave an updated version of my ‘Hacking Online Auctions’ talk at UnCon in London last week. The talk gave...
Reading time:
~2 min
Posted
by Ian de Villiers
on
02 September 2011
[2011/9/6 Edited to add Slideshare embed] I am currently in London at the first ever 44con conference. It’s been a...
Reading time:
Less than a minute
Posted
by marco
on
10 August 2011
Dominic is currently in the air somewhere over the Atlantic, returning from a long trip that included BlackHat, DefCon and...
Reading time:
Less than a minute
Posted
by marco
on
07 August 2011
On this past Thursday we spoke at BlackHat USA on Python Pickle. In the presentation, we covered approaches for implementing...
Reading time:
~17 min
Posted
by marco
on
22 May 2011
A longish post, but this wasn’t going to fit into 140 characters. This is an argument pertaining to security metrics,...
Reading time:
~8 min
Posted
by marco
on
15 November 2010
[This is the third in a series of posts on Pickle. Link to part one and two.] Thanks for stopping...
Reading time:
~12 min
Posted
by marco
on
09 November 2010
[This is the second in a series of posts on Pickle. Link to part one.] In the previous post I...
Reading time:
~6 min
Posted
by marco
on
09 November 2010
In our recent memcached investigations (a blog post is still in the wings) we came across numerous caches storing serialized...
Reading time:
~4 min
Posted
by behrang
on
25 October 2010
Introduction From time to time I like to delve into malware analysis as a pastime and post interesting examples, and...
Reading time:
~4 min
Posted
by Dominic White
on
10 August 2010
Last week we presented an invited talk at the ISSA conference on the topic of online privacy (embedded below, click...
Reading time:
~1 min
Posted
by marco
on
07 August 2010
Wow. At some point our talk hit HackerNews and then SlashDot after swirling around the Twitters for a few days....
Reading time:
~7 min
Posted
by marco
on
04 August 2010
[Update: Disclosure and other points discussed in a little more detail here.] Why memcached? At BlackHat USA last year we...
Reading time:
~5 min
Posted
by Dominic White
on
07 June 2010
Since joining SensePost I’ve had a chance to get down and dirty with the threat modeling tool. The original principle...
Reading time:
~5 min
Posted
by Dominic White
on
30 April 2010
In my previous role working as a security manager for a large retailer, I developed some password tools for various...
Reading time:
~2 min
Posted
by junaid
on
13 April 2010
As the need for online anonymity / privacy grew, the proxy industry flourished with many proxy owners generating passive incomes...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
16 November 2009
Our DC-17 video (of the “Clobbering the Cloud” talk) is now available on the the new look DefCon download site:...
Reading time:
~2 min
Posted
by Ian de Villiers
on
15 September 2009
Just arbitrary coolness regarding Microsoft’s Threat Modeller. It’s XSS-ible… Since this all works in file:///, not overly sure what the...
Reading time:
Less than a minute
Posted
by marco
on
05 August 2009
[updated: videos will be made available on this page] 140 slides in 75 minutes. They said it couldn’t be done…...
Reading time:
Less than a minute
Posted
by francesco
on
15 April 2009
With our recent release of BiDiBLAH 2.0, we’ve decided to revisit some real world scenarios, and ways BiDiBLAH can deal...
Reading time:
Less than a minute
Posted
by francesco
on
15 April 2009
After some queries regarding SPUD, I thought it would be a good idea to blog this reminder: * Spud can...
Reading time:
Less than a minute
Posted
by Ian de Villiers
on
07 April 2009
We’ve had a number of issues with reDuh and the various server versions published. Some clients worked with some versions...
Reading time:
Less than a minute
Posted
by Ian de Villiers
on
09 February 2009
An additional issue has been discovered in the ASPX version of reDuh. Although the script did work as expected, it...
Reading time:
Less than a minute
Posted
by Ian de Villiers
on
09 February 2009
We’ve received a number of queries regarding folkses unable to get the ASPX version of reDuh to work. In truth,...
Reading time:
~1 min
Posted
by behrang
on
22 January 2009
I’ve developed a FTP like multi-threaded server application as a target for this challenge of the month. It has been...
Reading time:
Less than a minute
Posted
by francesco
on
08 January 2009
Yup, that’s right, BiDIBLAH 2.0 has finally been released and is available for purchase at an incredibly low US$500!! You...
Reading time:
Less than a minute
Posted
by francesco
on
15 December 2008
The latest version of Wikto (2.1) is available for download here. New features include time anomaly reporting and easier access...
Reading time:
Less than a minute
Posted
by francesco
on
10 October 2008
Good news to all the blah’ers out there! The BETA version of BiDiBLAH 2 is available for download here. As...
Reading time:
~1 min
Posted
by Haroon Meer
on
25 August 2008
Hey guys.. Our BlackHat/Defcon talk this year featured a few tools that we promised to release.. The first tool, or...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
18 August 2008
Hey guys.. Most of our BlackHat/Defcon team has arrived back home in one piece.. I landed with a fever and...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
02 June 2008
Some of the DC16 speaker summaries have been posted, and these 2 caught my eye: Time-Based Blind SQL Injection using...
Reading time:
~5 min
Posted
by Haroon Meer
on
22 May 2008
Earlier this week we had an internal presentation on Attacking ActiveX Controls. The main reason we had it is because...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
21 February 2008
So felten et al basically figured that cooling dram chips allows an attacker to move them to another machine where...
Reading time:
~1 min
Posted
by Haroon Meer
on
11 December 2007
Rob had a rant on his site on the timing attack, with a CSRF twist.. We met him after our...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
06 December 2007
OK.. so it was a long time ago, and old code is supposed to embarrass you.. but i pulled casper.exe...
Reading time:
~2 min
Posted
by Haroon Meer
on
21 November 2007
Slashdot picked up on the blog post from Light Blue TouchPaper commenting on the fact that a researcher was suprised...
Reading time:
~1 min
Posted
by Haroon Meer
on
13 September 2007
These days its almost impossible to read a book on security or vuln-dev without a gratuitous IDA-Pro screenshot. IDA has...
Reading time:
~1 min
Posted
by Haroon Meer
on
12 September 2007
In early 2002 i suggested that we could solve some computer problems and south africas street-kid problem by setting up...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
04 September 2007
Steven Murdoch over at lightbluetouchpaper did an investigation into the Privila internship program.. What was also cool however was that...
Reading time:
~1 min
Posted
by Haroon Meer
on
02 September 2007
ok.. so a long time ago we tried the you-tube mentos stuff and happily wasted time (and coke) in the...
Reading time:
~8 min
Posted
by Charl van der Walt
on
24 August 2007
In Vegas I bought Herman “Exploiting Online Games” by Greg Hoglund and Gary McGraw. Being the saint that I am,...
Reading time:
~2 min
Posted
by Haroon Meer
on
10 August 2007
The slides | tool | paper from BlackHat07/DefCon07 have been posted online for your wget’ing pleasure. More details on squeeza...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
03 August 2007
During our talk we demo’d squeeza.. We will link to the slides and .ppt as soon as we can, but...
Reading time:
~1 min
Posted
by Haroon Meer
on
30 July 2007
(always wanted to say that!) 2 SensePost Training sessions are over, and as i type The weekday sessions are at...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
13 June 2007
BlackHat Vegas is almost on us again, and this will be the 6th year running that we present there.. This...
Reading time:
~1 min
Posted
by Charl van der Walt
on
09 June 2007
After a six hour delay due to technical problems *before* my journey even started I’m finally on the plane and...