How jwt hijacking can be prevented 16 Apr 2021 JSON Web Tokens (JWTs) are commonly used in many applications to validate the client's identity. However, there are... Read more
PoshC2 - Introducing Native macOS Implants 14 Apr 2021 Over the past few years, we have seen an increase in the number of macOS environments we are... Read more
VM Detection Tricks, Part 3: Hyper-V RAW Network Protocol 7 Apr 2021 This month’s virtual machine detection trick involves detecting the presence of the Hyper-V RAW network protocol. This protocol... Read more
VM Detection Tricks, Part 2: Driver Thread Fingerprinting 12 Mar 2021 This year we’re documenting a series of new and as-yet undocumented VM detection tricks. These detection tricks will... Read more
CVE-2020-24550: Open Redirect in Episerver Find 11 Feb 2021 During the course of our work, we discovered an open redirect vulnerability in Episerver Find. This has... Read more
Introducing FComm - C2 Lateral Movement 27 Jan 2021 Over the past few years, we have found a few edge cases where the traditional lateral movement communication... Read more
VM Detection Tricks, Part 1: Physical memory resource maps 20 Jan 2021 In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021.... Read more
PoshC2 Improved HTML Reports 6 Jan 2021 Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,... Read more
The fireeye hack 15 Dec 2020 With the recent hack of FireEye, there have been many questions circulating among cyber security experts and the... Read more
CVE-2020-14418: madCodeHook Library Local Privilege Escalation 1 Dec 2020 Nettitude discovered a vulnerability in the ‘madCodeHook’ third party library which caused a number of security products, including... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*