Ethical hacking & pentesting blog
Come for the PoCs and security research focused on new CVEs and stay for the ethical exploitation guides and how-tos our offensive security specialists create.
Get fresh security research
In your inbox. (No fluff. Actionable stuff only.)
How to attack F5 BIG-IP using CVE-2020-5902 (TMUI RCE)
Let’s tackle a vulnerability that broke out not only in BIG-IP firewalls but also on social media! When a major issue affecting a security product emerges, it immediately makes the headlines, the paradox of the situation impossible to ignore.
- Author(s)
- Published at
- Updated at
How to chain SMBleed and SMBGhost to get RCE in Windows 10
Think like an attacker, act like a defender. That’s the pentesters’ mantra, if you ask me. That’s why today we’re diving into one of the most interesting tactics that malicious actors use: vulnerability chaining.
- Author(s)
- Published at
- Updated at
How to exploit the DotNetNuke Cookie Deserialization
We looked at around 300 DotNetNuke deployments in the wild and discovered that one in five installations was vulnerable to CVE-2017-9822. That includes governmental and banking websites. As part of this research, we discovered a Remote Code Execution vulnerability exploitable through DNN Cookie Deserialization in one of the U.S. Department Of Defense’s biggest websites. After having responsibly reported it through HackerOne, the DOD solved the high-severity vulnerability and disclosed the report, with all details now publicly available.
- Author(s)
- Published at
- Updated at
[New feature] Scan internal networks with the VPN Agent
To enhance the way you scan your internal networks, we added a new way to perform this on Pentest-Tools.com. It is a lot easier and does not require any special configuration. All you need to do is run the VPN Agent and start scanning!
- Author(s)
- Published at
- Updated at
How to detect the Microsoft SMBGhost vulnerability with Pentest-Tools.com
For the past couple of weeks, a critical RCE vulnerability found in Microsoft Server Message Block 3.1.1 (SMBv3) has kept both the Microsoft users and the security community on their toes. To help our customers better detect if their Windows hosts were affected by the critical SMBGhost vulnerability, we developed and added a new, dedicated scanner on Pentest-Tools.com.
- Author(s)
- Published at
- Updated at
[New scanners] Detect SMBGhost and Ghostcat vulnerabilities with Pentest-Tools.com
Vulnerability scanners are essential pentesting tools to quickly discover critical security flaws before hackers do. The more specific, the more useful! To help our customers better detect if their systems are impacted by the SMBGhost and GhostCat vulnerabilities, we built and added two new, dedicated scanners on Pentest-Tools.com.
- Author(s)
- Published at
- Updated at
[New enterprise feature] Add sub-users and share your Pentest-Tools.com plan
Working on a security project is always better when your team is involved. That’s why you can now add multiple users to your Pentest-Tools.com account and share the plan with your team members. The new feature allows the account owner (the parent user) to create sub-users and share access to their account.
- Author(s)
- Published at
- Updated at
How to simulate phishing attacks with the HTTP Request Logger
As a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!
- Author(s)
- Published at
- Updated at
API support for TCP Port Scan, API scans & more updates
Through our API integration, you can easily streamline and automate your pentesting tasks for better results. Because we know how important it is for your business, we’ve worked on improving our API system to become a fully programmable penetration testing platform for your specific needs. Here are 3 new API improvements we added in the current update
- Author(s)
- Published at
- Updated at