Tarlogic's Blog - Cybersecurity - Page 9

Cybersecurity articles with security analysis and ethical hacking technics information

Attacking QA platforms: Selenium Grid
Attacking QA platforms: Selenium Grid

During the course of a Red Team exercise serveral QA assets where discovered. In particular the usage of the Selenium Grid platform without authentication caught the team’s a[...]

Read more
Security in Sciter-based applications
Security in Sciter-based applications

[...]

Read more
Linux process infection
Linux process infection

[...]

Read more
SaSSHimi: Evading SSH AllowTcpForwarding
SaSSHimi: Evading SSH AllowTcpForwarding

[...]

Read more
Arecibo: an OOB exfiltration tool (DNS & HTTP)
Arecibo: an OOB exfiltration tool (DNS & HTTP)

[...]

Read more
Ubiquoss Switch VP5208A Vulnerability – CVE-2018-10024
Ubiquoss Switch VP5208A Vulnerability – CVE-2018-10024

Vendor: Ubiquoss Product: Ubiquoss Switch VP5208A Discovered by: Juan Manuel Fernandez – Tarlogic (@TheXC3LL) Ubiquoss Switch VP5208A Vulnerability – CVE-2018-10024 Cre[...]

Read more
Abusing SeLoadDriverPrivilege for privilege escalation
Abusing SeLoadDriverPrivilege for privilege escalation

0x01 – Preamble In Windows operating systems, it is well known that assigning certain privileges to user accounts without administration permissions can result in local privilege[...]

Read more
Interactive Shell via Bluetooth
Interactive Shell via Bluetooth

[...]

Read more
Pentests in restricted VDI environments
Pentests in restricted VDI environments

A common scenario during an assessment or a pentesting is starting it from a VDI environment, focused towards “what could an insider or an attacker who has stolen a worker[...]

Read more
1 6 7 8 9 10 11 12