Skip content

111 120 192 results

Filter by

  • WinDbg: using pykd to dump private symbols

    We’ve recently been conducting some reverse engineering and vulnerability analysis on an Anti Virus (AV) product and wanted...

    Read more
  • Using Frida to Bypass Snapchat’s Certificate Pinning

    We have recently published an article discussing the basics of certificate pinning – TLS Certificate Pinning 101. We...

    Read more
  • TLS Certificate Pinning 101

    Certificate pinning is the process of associating a host with their expected X.509 certificate or public key. Once...

    Read more
  • CVE-2017-7351: REDCap 7.0.0 - 7.0.10 SQL Injection

    A SQL injection vulnerability exists in REDCap versions 7.0.0 – 7.0.10.  This has been designated CVE-2017-7351.

    Read more
  • Making PoshC2 More Accessible With a $5 VPS

    Users may find it difficult to host a PoshC2 server as it requires a Windows host, either directly...

    Read more
  • CVE-2019-9702: Symantec Encryption Desktop Local Privilege Escalation - Exploiting...

    These vulnerabilities remain unpatched at the point of publication.  We have been working with Symantec to try and...

    Read more
  • PoshC2 v3 with SOCKS Proxy (SharpSocks)

    We’ve been working on quite a few changes since the release of PoshC2 v2, our public Command &...

    Read more
  • DerbyCon 2017 CTF Write Up

    The excellent Derbycon 2017 has just come to an end and, just like last year, we competed in the Capture The...

    Read more
  • How to fix Burp Suite SSL/TLS connection problems

    Burp Suite is one of the tools our consultants frequently use when diving into a web application penetration...

    Read more
  • Lifting the clouds from cloud investigations

    Nettitude’s IR team recently had an opportunity to investigate a breach in a cloud environment. The client had...

    Read more

Error

Error

No results found

No results found that match your query

Loading results