TARLOGIC's BLOG
Cybersecurity - Page 10
Cybersecurity articles with security analysis and ethical hacking technics information
Attacking QA platforms: Selenium Grid
During the course of a Red Team exercise serveral QA assets where discovered. In particular the usage of the Selenium Grid platform without authentication caught the team’s a[...]
Read moreUbiquoss Switch VP5208A Vulnerability – CVE-2018-10024
Vendor: Ubiquoss Product: Ubiquoss Switch VP5208A Discovered by: Juan Manuel Fernandez – Tarlogic (@TheXC3LL) Ubiquoss Switch VP5208A Vulnerability – CVE-2018-10024 Cre[...]
Read moreAbusing SeLoadDriverPrivilege for privilege escalation
0x01 – Preamble In Windows operating systems, it is well known that assigning certain privileges to user accounts without administration permissions can result in local privilege[...]
Read morePentests in restricted VDI environments
A common scenario during an assessment or a pentesting is starting it from a VDI environment, focused towards “what could an insider or an attacker who has stolen a worker[...]
Read more