Reading time:
~5 min
Posted
by Leon Jacobs
on
23 November 2020
Much like other events in 2020, our annual internal hackathon took a remote format this year, sporting over 120 hackers...
Reading time:
~7 min
Posted
by Emmanuel Cristofaro
on
23 November 2020
Ciao belli! On the 19th of November 2020, SONY finally released the new PlayStation 5 in the UK. A few...
Reading time:
~10 min
Posted
by Leon Jacobs
on
13 November 2020
When we finally decided on a date, sensecon 2020 was little over a month away. Unlike our public client events,...
Reading time:
~10 min
Posted
by Szymon Ziolkowski
on
09 November 2020
We have written a lot about SenseCon by now, but there is one more thing we can talk about! In...
Reading time:
~6 min
Posted
by Michael Kruger
on
04 November 2020
Something I have found myself doing more and more often is using Exchange Web Services (EWS) to bypass 2FA. I...
Reading time:
~4 min
Posted
by Dominic White
on
08 October 2020
This is an update on this previous post on foreign NT hashes where I got things a little wrong by...
Reading time:
~5 min
Posted
by Michael Kruger
on
02 October 2020
Thanks to a tweet Dominic responded to, I saw someone mention Passing-the-hash when I think they actually meant relay. The...
Reading time:
~8 min
Posted
by Paul van der Haas
on
11 September 2020
A while ago Jonas Lykkegaard disclosed a zeroday that could be used to create files in the SYSTEM folder. CVE-2020-16885...
Reading time:
~53 min
Posted
by Leon Jacobs
on
02 September 2020
The end of the year is getting closer, fast, so I figured it was a perfect time to talk about...
Reading time:
~8 min
Posted
by Paul van der Haas
on
19 August 2020
Background Are you tired of working from home due to COVID? While this is quite a unique situation we find...
Reading time:
~7 min
Posted
by Dominic White
on
19 August 2020
If you’ve ever cracked a hash with hashcat, you’ll know that sometimes it will give you a $HEX[0011223344] style clear....
Reading time:
~16 min
Posted
by Tyron Kemp
on
03 August 2020
This is a summary of our BlackHat USA 2020 talk. Introduction On some of our engagements, Szymon and I found...
Reading time:
~5 min
Posted
by Dominic White
on
31 July 2020
From the 1st of August 2020, SensePost will be changing, from the name of our company, to the name of...
Reading time:
~20 min
Posted
by Justin Perdok
on
24 July 2020
tl;dr: In this writeup I am going to describe how to abuse a GenericWrite ACE misconfiguration in Active Directory to...
Reading time:
~13 min
Posted
by Felipe Molina
on
20 July 2020
After the SigRed (CVE-2020-1350) write-up was published by Check Point, there was enough detailed information for the smart people, like...
Reading time:
~5 min
Posted
by Rogan Dawes
on
20 July 2020
When conducting a red team exercise, we want to blend in as much as possible with the existing systems on...
Reading time:
~17 min
Posted
by Felipe Molina
on
14 July 2020
I recently tested an Internet facing Anti-Spam product called SpamTitan Gateway. As you could infer from the name of the product,...
Reading time:
~4 min
Posted
by Jameel Haffejee
on
13 July 2020
Intro For the longest time I had the idea to implement a notification system that would alert me if someone...
Reading time:
~18 min
Posted
by Rogan Dawes
on
09 July 2020
In part 1 of this series, we set up the NanoPi R1S as a USB attack tool, covering OS installation,...
Reading time:
~6 min
Posted
by Szymon Ziolkowski
on
29 June 2020
I was recently on a mobile assessment where you could only register one profile on the app, per device. To...
Reading time:
~11 min
Posted
by Philippe Vogler
on
24 June 2020
While working on DoubleAgent as part of the Introduction To Red Teaming course we’re developing for RingZer0, I had a...
Reading time:
~40 min
Posted
by Javier Jimenez
on
29 May 2020
Intro The last few months I’ve been studying Chrome’s v8 internals and exploits with the focus of finding a type...
Reading time:
~12 min
Posted
by Javier Jimenez
on
22 May 2020
Categories:
0day,
Exploit development,
Webapps,
Dos,
Monitor,
Network,
Poc,
Proofofconcept,
Prtg,
Prtg network monitor,
Rce,
Shodan
Intro Last year I wrote how to weaponize CVE-2018-19204. This blog post will continue and elaborate on the finding and...
Reading time:
~11 min
Posted
by Rogan Dawes
on
18 May 2020
As part of our preparations for our upcoming RingZer0 “Q Division” Training, I have been working on making a software...
Reading time:
~9 min
Posted
by Jason Spencer
on
24 April 2020
On the 27th of April 2020 SensePost created a CTF challenge (https://challenge.sensepost.com) for the public. The names of those who...
Reading time:
~18 min
Posted
by Philippe Vogler
on
23 April 2020
I’ve been spending some time building new content for our Introduction to Red Teaming course, which has been great for...
Reading time:
~10 min
Posted
by Hector Cuesta
on
26 March 2020
Introduction Recently, I encountered a fully password-less environment. Every employee in this company had their own smart card that they...
Reading time:
~27 min
Posted
by Sergio Lazaro
on
09 March 2020
Intro In this blog post I want to show a simulation of a real-world Resource Based Constrained Delegation attack scenario...
Reading time:
~15 min
Posted
by Javier Jimenez
on
28 February 2020
Intro Last Christmas I was doing quite a bit of research around an exploit for Chrome’s JavaScript engine, V8. While...
Reading time:
~36 min
Posted
by Emmanuel Cristofaro
on
24 January 2020
Hacking PlayStation DualShock controllers to stream audio to their internal speakers. Ciao a tutti. Introduction I didn’t really know what...