CodePenetration TestingRed TeamResearch February 19, 2020 Adaptive DLL Hijacking DLL hijacking has been a centerpiece of our operations for many years. During that time…Read More
InfrastructurePenetration TestingRed Team June 13, 2019 Modern Red Team Infrastructure There’s been a lot of talk recently regarding modern strategies for red team infrastructure. The…Read More
CodePenetration TestingRedTeamToolkit October 4, 2018 Introducing the Red Team Toolkit We are excited to introduce the Red Team Toolkit! The Red Team Toolkit (RTT) is…Read More
ExploitsPenetration Testing September 10, 2018 An Approach to Bypassing Mail Filters TLDR By "nulling" the first one or two bytes of a docm file, some spam…Read More
Penetration Testing June 26, 2018 ESPKey + Long Range RFID Reader = A New Tastic Thief There have been plenty of blog posts, and security conference talks about building long-range RFID…Read More
Penetration Testing March 9, 2018 CAPTCHAs Done Right? Web App assessments are probably one of the most popular penetration tests performed today. These are…Read More
ExploitsPenetration TestingWeb February 12, 2018 Weaponizing self-xss Maybe you're a web app pentester who gets frustrated with finding self-xss on sites you…Read More
DefensePenetration Testing February 6, 2018 Windows Events, Sysmon and Elk…oh my! Overview While assisting customers in collaborative red and blue team assessments, we are often asked…Read More
Penetration Testing January 22, 2018 Insecurity Through Obscurity Web App assessments are probably one of the most popular penetration tests performed today. These are…Read More
CodePenetration Testing August 23, 2017 sRDI – Shellcode Reflective DLL Injection During our first offering of "Dark Side Ops II - Adversary Simulation" at Black Hat…Read More