COM and the PowerThIEf 10 Jul 2018 Recently, Component Object Model (COM) has come back in a big way, particularly with regards to it being... Read more
CVE-2018-6851 to CVE-2018-6857: Sophos Privilege Escalation Vulnerabilities 25 Jun 2018 We have recently disclosed a list of vulnerabilities to Sophos that allow local attackers to elevate their privileges... Read more
CVE-2018-10956: Unauthenticated Privileged Directory Traversal in IPConfigure Orchid Core... 14 Jun 2018 IPConfigure Orchid Core VMS is a Video Management System that is vulnerable to a directory traversal attack, which... Read more
Introducing Prowl 5 Jun 2018 Prowl was initially designed as an in house tool to aid engagements where there’s a requirement to capture... Read more
Apache mod_python for red teams 31 May 2018 Nettitude’s red team engagements are typically designed to be as highly targeted and as stealthy as possible. For... Read more
WinDbg: using pykd to dump private symbols 11 Apr 2018 We’ve recently been conducting some reverse engineering and vulnerability analysis on an Anti Virus (AV) product and wanted... Read more
CVE-2017-7351: REDCap 7.0.0 - 7.0.10 SQL Injection 8 Feb 2018 A SQL injection vulnerability exists in REDCap versions 7.0.0 – 7.0.10. This has been designated CVE-2017-7351. Read more
Making PoshC2 More Accessible With a $5 VPS 31 Jan 2018 Users may find it difficult to host a PoshC2 server as it requires a Windows host, either directly... Read more
CVE-2019-9702: Symantec Encryption Desktop Local Privilege Escalation - Exploiting... 28 Nov 2017 These vulnerabilities remain unpatched at the point of publication. We have been working with Symantec to try and... Read more
PoshC2 v3 with SOCKS Proxy (SharpSocks) 15 Nov 2017 We’ve been working on quite a few changes since the release of PoshC2 v2, our public Command &... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*