| | Using Open Groups to Escalate Privileges in Google Cloud (netspi.com) |
|
1 point by speckx 5 months ago | past
|
| | Ethereum Virtual Machine Internals – Part 1 (netspi.com) |
|
1 point by netfortius on April 20, 2023 | past
|
| | What Makes a Successful Technologist, a Day in the Life of a Security Firm CISO (netspi.com) |
|
2 points by alexellisuk on Jan 12, 2021 | past
|
| | CVE-2020-17049: Kerberos Bronze Bit Attack (netspi.com) |
|
2 points by aburan28 on Dec 9, 2020 | past
|
| | Stealing unencrypted SSH-agent keys from memory (2014) (netspi.com) |
|
20 points by kencausey on Oct 13, 2020 | past | 7 comments
|
| | Four Ways to Bypass Android SSL Verification and Certificate Pinning (netspi.com) |
|
2 points by necrodome on Jan 3, 2019 | past
|
| | Beyond LLMNR/NBNS Spoofing (netspi.com) |
|
2 points by _pdp_ on July 10, 2018 | past
|
| | Tokenvator: A Tool to Elevate Privilege Using Windows Tokens (netspi.com) |
|
1 point by vuln on June 20, 2018 | past
|
| | Attacking SSO: Common SAML Vulnerabilities and Ways to Find Them (netspi.com) |
|
2 points by based2 on March 1, 2018 | past
|
| | SQL Injection Wiki (netspi.com) |
|
346 points by sidcool on Dec 21, 2017 | past | 35 comments
|
| | PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server (netspi.com) |
|
2 points by flexside170 on July 19, 2016 | past
|
| | Microsoft LAPS – Storing Cleartext Passwords in LDAP (netspi.com) |
|
2 points by flexside170 on May 6, 2015 | past
|
| | Playing with Content-Type – XXE on JSON Endpoints (netspi.com) |
|
2 points by flexside170 on April 20, 2015 | past
|
| | Decrypting WebLogic Passwords (netspi.com) |
|
16 points by mortenlarsen on April 10, 2015 | past | 6 comments
|
| | iOS Tutorial – Dumping the Application Memory Part 2 (netspi.com) |
|
1 point by alexcasalboni on March 10, 2015 | past
|
| | Dumping Git Data from Misconfigured Web Servers (netspi.com) |
|
2 points by fla on Feb 3, 2015 | past
|
| | Decrypting MSSQL Credential Passwords (netspi.com) |
|
2 points by __Joker on Jan 26, 2015 | past
|
| | 1How to Bypass the PowerShell Execution Policy (netspi.com) |
|
4 points by nullbind on Sept 8, 2014 | past
|
| | Cracking Stats for Q2 2014 (netspi.com) |
|
3 points by nullbind on Aug 18, 2014 | past
|
| | Stealing unencrypted SSH-agent keys from memory (netspi.com) |
|
81 points by lelf on July 21, 2014 | past | 38 comments
|
| | GPU Password Cracking – Building a Better Methodology (netspi.com) |
|
1 point by kfosaaen on March 17, 2014 | past
|
| | Sky Prioritize Yourself (netspi.com) |
|
1 point by lelf on Nov 19, 2013 | past
|