The exploitation of a machine is only one step in a penetration test. What do you do next? How can you pivot from the exploited
Penetration Testing or Vulnerability Assessment – Which one should I choose?
In this post we will take a quick look at the differences between vulnerability assessment (VA) and penetration testing (PT). Furthermore, we’ll give a set of
Scripting Metasploit for a Real-Life Pentest
During a recent internal penetration test, we got to the point where we had to search a lot of Windows machines for Domain Admin tokens.
Clickjacking in Firefox Hello
Clickjacking, the art of tricking users into clicking on links or buttons that no sane person would ever click on. But how much damage can you
Upgrade your DLL to Reflective DLL
If you want to execute code stealthily on a machine and the antivirus stands in your way, you should think about avoiding the disk because
Bypassing Windows Lock Screen via Flash Screensaver
We have recently discovered an easy method to bypass the Windows Lock screen when a flash screensaver is running. The method allows an attacker to