Mobile phones have become an indispensable part of our daily life. We use mobile phones to communicate with our loved ones, for quick access to
Category: Pentest techniques
Scripting Metasploit for a Real-Life Pentest
During a recent internal penetration test, we got to the point where we had to search a lot of Windows machines for Domain Admin tokens.
Upgrade your DLL to Reflective DLL
If you want to execute code stealthily on a machine and the antivirus stands in your way, you should think about avoiding the disk because
Bypassing Windows Lock Screen via Flash Screensaver
We have recently discovered an easy method to bypass the Windows Lock screen when a flash screensaver is running. The method allows an attacker to
Intercepting functions from statically linked libraries
A common technique for blackbox penetration testing of a binary application is intercepting function calls. This technique helps the pentester to properly understand how the application works
How to intercept traffic from Java applications
During a security assessment you may need to monitor the traffic from a Java application and also to modify it. What can you do? What