Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • Contact
  • About

Author: Adrian Furtuna

Pivoting to internal network via non-interactive shell

August 6, 2015 Adrian Furtuna

During a recent penetration test we have experienced the situation where we’ve gained remote code execution with limited privileges to a web server and had

Continue reading

Penetration Testing or Vulnerability Assessment – Which one should I choose?

March 31, 2015 Adrian Furtuna

In this post we will take a quick look at the differences between vulnerability assessment (VA) and penetration testing (PT). Furthermore, we’ll give a set of

Continue reading

Bypassing Windows Lock Screen via Flash Screensaver

February 23, 2015 Adrian Furtuna

We have recently discovered an easy method to bypass the Windows Lock screen when a flash screensaver is running. The method allows an attacker to

Continue reading

5 Benefits of a penetration test

January 5, 2015 Adrian Furtuna

Penetration testing projects are definitely fun for the passionate pentesters. However, the question is what are the real benefits of a pentest for the client

Continue reading

Top Posts

  • Root detection and SSL pinning bypass
  • Pentesting Azure: RECON Techniques
  • Mobile Pentesting 101 - Bypassing Biometric Authentication
  • Our DefCamp 2022 talks are here!
  • Practical Network Penetration Tester (PNPT): Real-life Penetration Testing exam - Tips & Tricks to pass the exam

Blog Stats

  • 285,708 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 106 other subscribers

Categories

  • Active Directory (1)
  • Announcements (1)
  • Cloud Security (4)
    • aws (4)
  • Conferences (4)
  • Embedded systems security (2)
    • IoT Pentesting (1)
  • Ethical Hacking (10)
  • General security (10)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (16)
    • Code Review (1)
  • Mobile security (5)
  • Network security (3)
  • Operating systems (1)
  • Penetration Testing (13)
  • Pentest techniques (21)
  • Web security (10)
Blog at WordPress.com.
  • Follow Following
    • Security Café
    • Join 106 other followers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...