Effectively analysing sysmon logs 9 Mar 2017 We previously covered setting up and using sysmon (System Monitor), which is part of the Sysinternals suite from Microsoft. In this... Read more
Putting attackers in hi vis jackets with sysmon 16 Feb 2017 Sysmon (short for system monitor) has been part of the Sysinternals suite for several years. It comprises kernel-mode driver... Read more
More XSS Shenanigans 3 Feb 2017 In September, we released our XSS Payloads collection of scripts and they went down really well within the pen-testing community.... Read more
Who owns your runtime? 11 Jan 2017 Can mobile applications trust their own runtime environment? The answer to this burning question that has no doubt... Read more
Fun with Windows binaries - application whitelist bypass using... 15 Dec 2016 We were inspired by the work @subTee has done with application whitelisting. Consequently, we decided to have a hunt around for legitimate... Read more
PoshC2 - new features 1 Dec 2016 There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we... Read more
An analysis of the RIG exploit kit 27 Oct 2016 Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This... Read more
Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the... 13 Oct 2016 We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting... Read more
From macro to malware - a step by step... 3 Oct 2016 We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office... Read more
ZeroPress 16 Sep 2016 ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*