ETWHash - "He who listens, shall receive" 3 May 2023 ETWHash is a small C# tool used during Red Team engagements, that can consume ETW SMB events and... Read more
Creating an IR Nightmare Drop Box 21 Apr 2023 A common objective of physical assessments is placement of a drop box to establish communication out of the... Read more
Using LoRa as a Side Channel 19 Apr 2023 This article will focus on using a LoRa to create a side channel using a public LoRa infrastructure.... Read more
I Don't Need a Badge - Lessons Learned from... 22 Mar 2023 A covert entry assessment is a physical security assessment in which penetration testers try to gain access to... Read more
Exploiting Network Security Cameras: Understanding and Mitigating the Risks 15 Feb 2023 Security cameras are an important tool for protecting homes and businesses. While they provide valuable assurance for physical... Read more
CVE-2022-25026 & CVE-2022-25027: Vulnerabilities in Rocket TRUfusion Enterprise 4 Jan 2023 Nettitude recently conducted a penetration test for a customer who used Rocket TRUfusion Enterprise within their external infrastructure.... Read more
Avoiding Detection with Shellcode Mutator 21 Dec 2022 Today we are releasing a new tool to help red teamers avoid detection. Shellcode is a small piece... Read more
CVE-2021-43444 to 43449: Exploiting ONLYOFFICE Web Sockets for Unauthenticated... 14 Dec 2022 About 18 months ago, I was conducting a pentest of a document management platform. It was designed with... Read more
What is Cybersquatting? 9 Nov 2022 Cybersquatting is the act of registering a domain name which looks similar to a target domain in order... Read more
How Circle Banned Tornado Cash Users 28 Sep 2022 Tornado Cash is an open-source, decentralised cryptocurrency mixer. Using zero-knowledge proofs, this mixes identifiable funds with others, obscuring... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*