Vulnerabilities in OCS Inventory 2.4.1
[...]
Red team & Threat hunting Blog - offensive security
Introduction In a Red Team operation, a perimeter asset vulnerable to SQL Injection was identified. Through this vulnera[...]
During a Tarlogic Red Team operation, a serious vulnerability was discovered in Cobian Backup software (CVE-2017-11318) [...]
Web servers exposed to the Internet are a traditional entry point during penetration tests and Red Team exercises. Ensur[...]
The creation of a keylogger in PowerShell during the development of a Tarlogic Red Team exercise was necessary. And give[...]
In the last edition of HackRon, in our talk “The Red Team always wins” we tackled some techniques used duri[...]
Introduction to backdoors in SQL Using backdoors in SQL as a persistence method in compromised web environments is not o[...]