Pentesting 101: Working with exploits

Exploits, Vulnerabilities and Payloads: Practical Introduction

As penetration testers, we have to use exploits very often to demonstrate vulnerabilities to our customers. But where do we get them? How do we use them? And what should we keep in mind when using them? Exploits are dangerous ...
Terminal escape injection logo

Terminal Escape Injection

As information security professionals, we have to deal with potentially dangerous files practically on daily basis. We run various scripts, PoC code, exploits and other things and we put trust in the utilities that read those files. Can we really ...
Exploiting Firebird database

Firebird Database Exploitation

During penetration tests, we sometimes encounter a Firebird database installation running on the network. It typically runs on port tcp/3050 and often times it is configured with default credentials SYSDBA/masterkey. What can we do with this? Can we get a ...
Loading...