Skip content

31 40 187 results

Filter by

  • ETWHash - "He who listens, shall receive"

    ETWHash is a small C# tool used during Red Team engagements, that can consume ETW SMB events and...

    Read more
  • Creating an IR Nightmare Drop Box

    A common objective of physical assessments is placement of a drop box to establish communication out of the...

    Read more
  • Using LoRa as a Side Channel

    This article will focus on using a LoRa to create a side channel using a public LoRa infrastructure....

    Read more
  • I Don't Need a Badge - Lessons Learned from...

    A covert entry assessment is a physical security assessment in which penetration testers try to gain access to...

    Read more
  • Exploiting Network Security Cameras: Understanding and Mitigating the Risks

    Security cameras are an important tool for protecting homes and businesses. While they provide valuable assurance for physical...

    Read more
  • CVE-2022-25026 & CVE-2022-25027: Vulnerabilities in Rocket TRUfusion Enterprise

    Nettitude recently conducted a penetration test for a customer who used Rocket TRUfusion Enterprise within their external infrastructure....

    Read more
  • Avoiding Detection with Shellcode Mutator

    Today we are releasing a new tool to help red teamers avoid detection. Shellcode is a small piece...

    Read more
  • CVE-2021-43444 to 43449: Exploiting ONLYOFFICE Web Sockets for Unauthenticated...

    About 18 months ago, I was conducting a pentest of a document management platform. It was designed with...

    Read more
  • What is Cybersquatting?

    Cybersquatting is the act of registering a domain name which looks similar to a target domain in order...

    Read more
  • How Circle Banned Tornado Cash Users

    Tornado Cash is an open-source, decentralised cryptocurrency mixer. Using zero-knowledge proofs, this mixes identifiable funds with others, obscuring...

    Read more

Error

Error

No results found

No results found that match your query

Loading results