Skip content

91 100 152 results

Filter by

  • Apache mod_python for red teams

    Nettitude’s red team engagements are typically designed to be as highly targeted and as stealthy as possible. For...

    Read more
  • WinDbg: using pykd to dump private symbols

    We’ve recently been conducting some reverse engineering and vulnerability analysis on an Anti Virus (AV) product and wanted...

    Read more
  • CVE-2017-7351: REDCap 7.0.0 - 7.0.10 SQL Injection

    A SQL injection vulnerability exists in REDCap versions 7.0.0 – 7.0.10.  This has been designated CVE-2017-7351.

    Read more
  • Making PoshC2 More Accessible With a $5 VPS

    Users may find it difficult to host a PoshC2 server as it requires a Windows host, either directly...

    Read more
  • CVE-2019-9702: Symantec Encryption Desktop Local Privilege Escalation - Exploiting...

    These vulnerabilities remain unpatched at the point of publication.  We have been working with Symantec to try and...

    Read more
  • PoshC2 v3 with SOCKS Proxy (SharpSocks)

    We’ve been working on quite a few changes since the release of PoshC2 v2, our public Command &...

    Read more
  • DerbyCon 2017 CTF Write Up

    The excellent Derbycon 2017 has just come to an end and, just like last year, we competed in the Capture The...

    Read more
  • Lifting the clouds from cloud investigations

    Nettitude’s IR team recently had an opportunity to investigate a breach in a cloud environment. The client had...

    Read more
  • CVE-2017-8116: Teltonika router unauthenticated remote code execution

    We sometimes require internet connectivity in situations where a traditional connection is not easily possible. 4G routers provide...

    Read more
  • A quick analysis of the latest Shadow Brokers dump

    Just in time for Easter, the Shadow Brokers released the latest installment of an NSA data dump, which...

    Read more

Error

Error

No results found

No results found that match your query

Loading results