Ethical hacking & pentesting blog
Come for the PoCs and security research focused on new CVEs and stay for the ethical exploitation guides and how-tos our offensive security specialists create.
Get fresh security research
In your inbox. (No fluff. Actionable stuff only.)
From bypass to breach: how to get RCE in Confluence's latest CVEs
I’m gonna help you get the answers you need by demonstrating how to go beyond authentication bypass and achieve RCE using CVE-2023-22515 and CVE-2023-22518. Together we’ll explore their root causes and how to demonstrate the risk involved if an attacker uses these CVEs successfully.
- Author(s)
- Published at
- Updated at
We think we know how to explain the value of a penetration test
Welcome to We think we know, the podcast in which we flip the script on what you thought you knew about penetration testing. Navigating a maze of tight deadlines and limited scopes while your expertise sometimes gets squeezed into a compliance checkbox can take a toll. Offensive security work is not about ticking off tasks. Many of us have a deep need for constant growth – and some overdue recognition.
- Author(s)
- Published at
- Updated at
3 initial access tactics to simulate in your penetration tests
In this guide, I’ll talk about these tactics (phishing attacks, RDP attacks, and exploitable vulnerabilities) pentesters can use to simulate realistic attack scenarios and apply them in their ethical hacking engagements. You'll walk away with practical examples and actionable advice on how to effectively replicate these attacks. Plus, you’ll help your customers to create better security awareness inside their organizations.
- Author(s)
- Published at
- Updated at
How these offensive security books changed their readers - and their authors
Books have extraordinary power. They give both readers and authors new perspectives on how to see the world – and how to inhabit it more meaningfully. They allow you to go in-depth on a topic you love (or didn’t know you could love). Books create space for reflection and give you the chance to soak up someone else's experience and make parts of it your own.
- Author(s)
- Published at
- Updated at
Breaking down the 5 most common SQL injection attacks
In this ongoing battle, organizations and offensive security pros grapple with many questions: Why do these attacks persist? What are the most prevalent types of SQL injection attacks? And, most importantly, how do we prevent them effectively? You’ll get answers to these burning questions (and more!) in this practical guide.
- Author(s)
- Published at
- Updated at
Pro tips from 10 ethical hackers for stellar reports
The strongest proof of your work and expertize are the pentest reports you deliver. They capture your investigative skills, razor-sharp critical thinking, and creative hacking abilities. So your reports better be great. Looking to impress your team or clients with outstanding pentest reports? You're in luck! Delve into the collective wisdom of 10 seasoned offensive security professionals who've generously shared their insider tips on mastering the art of pentest reporting.
- Author(s)
- Published at
- Updated at
Why this 14-year-old heap corruption vulnerability in MS Word is still relevant
A critical vulnerability with Remote Code Execution (RCE) potential in Microsoft Word (CVE-2023-21716) with a CVSS score of 9.8 was among the Zero-Day vulnerabilities that were fixed.
- Author(s)
- Published at
- Updated at
The most exploited vulnerabilities in 2022
Offensive security is a fast-moving space, yet some security vulnerabilities persist for years, causing problem after problem. 2023 being no exception, you can spare yourself from repetitive work by learning to find and mitigate these top 10 CVEs.
- Author(s)
- Published at
- Updated at
Thinking outside the box: 3 creative ways to exploit business logic vulnerabilities in pentests
These flaws are particularly dangerous because attackers exploit behavioral patterns by interacting with apps in different ways than intended. When exploited successfully, they cause serious disruption, including business processes impact and reputational damage.
- Author(s)
- Published at
- Updated at