Hack Responsibly

Browse Hack Responsibly, a technical blog by The NetSPI Agents. Dive deep into the latest CVEs and vulnerabilities our team uncovers, and how we help NetSPI customers protect against the most important threats today.

Web Application Pentesting

Getting Shells at Terminal Velocity with Wopper

This article introduces Wopper – a new NetSPI tool that creates self-deleting PHP files and automates code execution on WordPress using administrator credentials.

Learn More
Adversary Simulation

CVE-2025-21299 and CVE-2025-29809: Unguarding Microsoft Credential Guard

Learn more about the January 2025 Patch Tuesday that addresses a critical vulnerability where Kerberos canonicalization flaws allow attackers to bypass Virtualization Based Security and extract protected TGTs from Windows systems.

Learn More
Web Application Pentesting

CVE-2025-27590 – Oxidized Web: Local File Overwrite to Remote Code Execution

Learn about a critical security vulnerability (CVE-2025-27590) in Oxidized Web v0.14 that allows attackers to overwrite local files and execute remote code execution.

Learn More
Web Application Pentesting

A Not So Comprehensive Guide to Securing Your Salesforce Organization

Explore key background knowledge on authorization issues and common bad practices developers may unintentionally introduce in Salesforce Orgs.

Learn More
Adversary Simulation

The Things We Think and Do Not Say: The Future of Our Beacon Object Files (BOFs)

Learn about a reference design for a new Beacon Object Files portable executable concept and helpful features.

Learn More
Adversary Simulation

CVE-2024-28989: Weak Encryption Key Management in Solar Winds Web Help Desk

Learn how an attacker with access to a backup file could potentially recover certain encrypted passwords.

Learn More
Hardware and Embedded Systems Penetration Testing

Practical Methods for Decapping Chips

Discover the intricate process of chip decapping, exposing secrets stored within snuggly layers of industrial epoxy, sleeping in beds of silicon.

Learn More
Cloud Pentesting

Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

Abusing Storage Account Permissions to attack Azure Machine Learning notebooks

Learn More
Web Application Pentesting

Exploiting Second Order SQL Injection with Stored Procedures

Learn how to detect and exploit second-order SQL injection vulnerabilities using Out-of-Band (OOB) techniques, including leveraging DNS requests for data extraction.

Learn More
Web Application Pentesting

From Informational to Critical: Chaining & Elevating Web Vulnerabilities

Learn about administrative access and Remote Code Execution (RCE) exploitation from a recent Web Application Pentest.

Learn More
Network Pentesting

Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0

Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.

Learn More
Cloud Pentesting

Filling up the DagBag: Privilege Escalation in Google Cloud Composer

Learn how attackers can escalate privileges in Cloud Composer by exploiting the dedicated Cloud Storage Bucket and the risks of default configurations.

Learn More