OUR LATEST RESEARCH
DerbyCon 2018 CTF Write Up
We have just returned from the always amazing DerbyCon 2018 conference. We competed in the 48 hour Capture the Flag competition under our usual team name of “Spicy Weasel” and are pleased to announce that, [...]
CVE-2018-5240: Symantec Management Agent (Altiris) Privilege Escalation
During a recent red team exercise, we discovered a vulnerability within the latest versions of the Symantec Management Agent (Altiris), that allowed us to escalate our privileges. Overview When the Altiris agent performs an inventory [...]
CVE-2018-12897: Solarwinds Dameware Mini Remote Control Local SEH Buffer Overflow
Dameware Mini Remote Control (MRC) is a remote administration utility allowing remote access to end user devices for a variety of purposes. You can often find it among the plethora of toolkits used by system [...]
Introducing Scrounger – iOS and Android mobile application penetration testing framework
Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. Scrounger conveniently brings together both major mobile operating systems - Android and iOS - into a single [...]
Extending C2 Lateral Movement – Invoke-Pbind
Invoke-Pbind is a mini post exploitation framework written in PowerShell, which builds C2 communications over SMB named pipes using a push rather than a pull mechanism. Pbind was initially created to overcome lateral movement problems, [...]