#penetrationtesting — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #penetrationtesting, aggregated by home.social.
-
The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)
-
How I Got RCE by Bypassing a JavaScript Sandbox
-
iX-Workshop: Active Directory hacken und schützen
Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.
#ActiveDirectory #Hacking #IT #iXWorkshops #Microsoft #PenetrationTesting #Security #news
-
Now You See Me: AADGraphActivityLogs
https://cloudbrothers.info/en/aadgraphactivitylogs/
Read on HackerWorkspace: https://hackerworkspace.com/article/now-you-see-me-aadgraphactivitylogs
-
How Hackers Hack Phones In Seconds
-
SERIOUSLY? AGAIN?
I feel like all these bugs (see also Apache Server, Firefox, etc.) are being discovered with Mythos, and they're just slowly trying to patch as many as they can before releasing the 'New Model'.
-
World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.
Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/
-
Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.
Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.
45 minutes. Q&A included.
Recording: https://www.youtube.com/watch?v=abGruzf2pPk
#penetrationtesting #offensivesecurity #vulnerabilitymanagement
-
Teachable to YouTube - Here's Why I Made the Switch
-
HackRF PortaPack Splash Screen Without Removing the SD Card
-
CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.
Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.
One file. One click. Full RCE. CVSS 8.1, patched, fully documented.
Write-up + PoC payloads: https://pentest-tools.com/blog/dotnetnuke-xss-to-rce
More research from our team: https://pentest-tools.com/research
-
AI Hacking Tools Are Coming Soon… NEW Neoconda AI Integration Details!
-
Compliance evidence trails don't build themselves in the two weeks before an audit.
Jan Pedersen walked through how continuous scanning handles that automatically: scheduled scans, before-and-after remediation proof, reports for both auditors and engineers.Recording: https://www.youtube.com/watch?v=HpuXoV_ngRQ
Tomorrow: session two on AI, accuracy and what's next.
1️⃣ 3:00 PM Bucharest / 1:00 PM London / 8:00 AM New York
👉 https://zoom.us/webinar/register/WN_uMAjbUwRSqCj1knLCcOCTg
2️⃣ 7:00 PM Bucharest / 5:00 PM London / 12:00 PM New York / 9:00 AM Los Angeles
👉 https://zoom.us/webinar/register/WN_xp1ewHcMQVKVoZe4bAEIxw
#infosec #compliance #penetrationtesting -
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
https://thehackernews.com/2026/04/mythos-changed-math-on-vulnerability.html
Read on HackerWorkspace: https://hackerworkspace.com/article/mythos-changed-the-math-on-vulnerability-discovery-most-teams-aren-t-ready-for-the-remediation-side
-
Path-Scoped Cookie Hacks with Uppercase & Post-based Raw Protobuf XSS (Ep 171)
-
iX-Workshop: Schwachstellen aufdecken – Pentesting mit Open-Source-Tools
Lernen Sie, wie Sie Sicherheitslücken in der eigenen Unternehmens-IT mit Hacker-Tools aufdecken und beseitigen.
#Hacking #IT #iXWorkshops #PenetrationTesting #Security #news
-
iX-Workshop: Active Directory hacken und schützen
Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.
#ActiveDirectory #Hacking #IT #iXWorkshops #Microsoft #PenetrationTesting #Security #news
-
7 Hacking Tools Used By PRO Hackers in 2026
-
Make Your Own JAILBROKEN Claude For Hacking
-
Feeling a bit nostalgic publishing this; it's an older clip, and I definitely miss seeing Gynvael's stuff ... Hx8 Teaser 2 Highlights! (part 1)
-
Open-Source AI Assisted Firmware Analysis - WAIRZ
-
NEW BIML Bibliography entry
https://arxiv.org/abs/2602.20021
Agents of Chaos
Natalie Shapira, et al.
This is a solid, but very preliminary study of a set of specific agentic AI risks. The philosophy behind this work is driven by red teaming (as opposed to security engineering).
-
FuelCMS doesn't validate the Host header on password reset requests.
Spoof it, trigger a reset for a valid user, and the app sends them a legitimate-looking email with your server in the link. They click. You get the token.
PTT-2025-029 / CVE-2026-30459, CVSS 7.1 High. No fix coming (vendor's been quiet for ~4 years).
Full PoC: https://pentest-tools.com/research -
This is the only Claude Code skill guide for Hacking you will ever need
-
🛡️ El Curso de Hacking con Kali Linux está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: https://wa.me/51949304030 💻 https://www.reydes.com/e/Curso_de_Hacking_con_Kali_Linux #penetrationtesting #techeducation #cybersecuritytraining #techskills #cyberdefense #cyberawareness #kalilinux -
Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.
We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.
7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.
https://www.enablesecurity.com/blog/introducing-dvrtc-damn-vulnerable-real-time-communications/
GitHub: https://github.com/EnableSecurity/DVRTC/
#infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN
-
Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.
We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.
7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.
https://www.enablesecurity.com/blog/introducing-dvrtc-damn-vulnerable-real-time-communications/
GitHub: https://github.com/EnableSecurity/DVRTC/
#infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN
-
Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.
We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.
7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.
https://www.enablesecurity.com/blog/introducing-dvrtc-damn-vulnerable-real-time-communications/
GitHub: https://github.com/EnableSecurity/DVRTC/
#infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN
-
Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.
We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.
7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.
https://www.enablesecurity.com/blog/introducing-dvrtc-damn-vulnerable-real-time-communications/
GitHub: https://github.com/EnableSecurity/DVRTC/
#infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN
-
Two weeks ago we published our analysis of TURN security threats. Today: how to fix them.
New guides covering implementation-agnostic best practices (IP range blocking, protocol hardening, rate limiting, deployment patterns) and coturn-specific configuration with copy-paste templates at three security levels.
Best practices: https://www.enablesecurity.com/blog/turn-security-best-practices/
coturn guide: https://www.enablesecurity.com/blog/coturn-security-configuration-guide/
Config templates on GitHub: https://github.com/EnableSecurity/coturn-secure-configcoturn 4.9.0 dropped yesterday with fixes for CVE-2026-27624 (IPv4-mapped IPv6 bypass of deny rules) and an inverted web admin password check that had been broken since ~2019. The guides cover workarounds for older versions.
#infosec #webrtc #security #TURN #coturn #penetrationtesting #voip #serversecurity
-
iX-Workshop: Active Directory hacken und schützen
Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.
#ActiveDirectory #Hacking #IT #iX #Microsoft #PenetrationTesting #Security #news
-
RE: https://infosec.exchange/@enablesecurity/116057294204565643
Wrote up our RTCon 2025 talk on TURN security threats. TURN servers are basically open proxies with extra steps. At DEF CON someone showed C2 over Zoom's TURN infra.
https://www.enablesecurity.com/blog/turn-server-security-threats/
#infosec #webrtc #security #TURN #penetrationtesting #voip -
TURN servers are meant to relay WebRTC media. To an attacker, they're just proxies.
We wrote up the threats we've been finding since 2017: relay abuse, DoS amplification, and software vulns.
https://www.enablesecurity.com/blog/turn-server-security-threats/
-
New HTB walkthrough: REDEEMER (Tier 0) - Redis fundamentals for beginners.
Redis is everywhere! Caching, session stores, job queues – and when it is exposed or misconfigured, it can leak sensitive data. I just published a beginner-focused walkthrough that covers:
🔹 How sensitive data can be stored directly in memory
🔹 What Redis is and common use cases
🔹 Why you shouldn't expose Redis without authentication
🔹 How to identify Redis with Nmap (port 6379)
🔹 How to connect with "redis-cli", enumerate keys and databases
🔹 Why "KEYS *" is fine for CTFs but use "SCAN" in productionThis is part of my ongoing Hack The Box Starting Point – Step-by-Step Walkthrough for Beginners series, where the goal is to help newcomers build strong fundamentals in ethical hacking.
🎥 Watch the HTB Redeemer walkthrough here:
▶ https://www.youtube.com/watch?v=81JN1vy1HGY
📂 Full playlist:
▶ https://www.youtube.com/playlist?list=PL2mncq0mb-6iZ6ngDmwGEywmxnCYwO2s_
If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.
Happy learning and keep hacking ethically 🔐
#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #redis
-
💡 Understanding core network protocols is fundamental for any aspiring cyber security professional. One of the most common that you will encounter is SMB (Server Message Block).
In my latest video, I provide a detailed, beginner friendly walkthrough of the "DANCING" machine from Hack The Box, focusing entirely on SMB enumeration and access 🚀
You will learn:
🔹 What SMB (Server Message Block) is and how it works
🔹 Common SMB ports (139 & 445) and why they matter
🔹 How to use Nmap for targeted service enumeration such as SMB services
🔹 How to enumerate SMB shares using smbclient
🔹 Understanding anonymous / misconfigured shares
🔹 Downloading files from SMB shares and capturing the flagThis is a perfect starting point for anyone new to ethical hacking.
🎥 Watch the HTB DANCING walkthrough here:
https://www.youtube.com/watch?v=CpaBWeq9JU8
📂 Full playlist:
https://www.youtube.com/playlist?list=PL2mncq0mb-6iZ6ngDmwGEywmxnCYwO2s_
If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.
Happy learning and keep hacking ethically 🔐
#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #SMB
-
Just published a new beginner-friendly walkthrough for Hack The Box Starting Point - FAWN (Tier 0).
This machine is an excellent introduction to FTP (File Transfer Protocol) and helps beginners understand:
🔹 How FTP works
🔹 Why FTP is insecure by design
🔹 What are the secure alternatives of FTP
🔹 How attackers enumerate services using Nmap
🔹 How anonymous FTP login works
🔹 What is the man command
🔹 How to retrieve files and capture the flagInstead of rushing through commands, this walkthrough explains the concepts behind every step, which is something I wish I had when I first started learning ethical hacking.
If you are new to penetration testing or is an aspiring ethical hacker, Hack The Box Starting Point is a fantastic learning platform.
🎥 Watch the FAWN walkthrough here:
https://www.youtube.com/watch?v=SLFJOEq5w6Y
📂 Full playlist:
https://www.youtube.com/watch?v=OqxPRwP8t_s&list=PL2mncq0mb-6iZ6ngDmwGEywmxnCYwO2s_
If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.
Happy learning and keep hacking ethically 🔐
#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #FTP
-
New Learning Tool Nmap Timing Visualizer
In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguments fun and interactive.
chickenpwny.github.io/NmapTimingTe...
-
New tool: Interactive Nmap Timing Template Visualizer
In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguements fun and interactive.
-
#RemoteWork #RemoteJobs #PythonDeveloper #CyberSecurity #Neurodiversity #AutismAtWork #InclusiveTech #ITSupport #SoftwareDevelopment #EntryLevelCybersecurity #StartingCybersecurityCareer #EthicalHacking #BugBounty #MachineLearning #NetworkSecurity #IsraelTech #Accessibility #PenetrationTesting #TechCareer #Automation #HighFunctioningAutism #STEMCareers #AutismInTech #Coding #Programming #CloudComputing #TechCommunity #SecurityResearch #PythonProjects #DataScience #TechOpportunities
-
#RemoteWork #RemoteJobs #PythonDeveloper #CyberSecurity #Neurodiversity #AutismAtWork #InclusiveTech #ITSupport #SoftwareDevelopment #EntryLevelCybersecurity #StartingCybersecurityCareer #EthicalHacking #BugBounty #MachineLearning #NetworkSecurity #IsraelTech #Accessibility #PenetrationTesting #TechCareer #Automation #HighFunctioningAutism #STEMCareers #AutismInTech #Coding #Programming #CloudComputing #TechCommunity #SecurityResearch #PythonProjects #DataScience #TechOpportunities
-
“A 250-page vuln report is useful for no one.”
That’s how Elpha Secure’s CTO summed up their reality before using Pentest-Tools.com. And we can totally understand!Scattered tools and noise-heavy reports made scaling painful. Now, their team gets:
✅ Fast, automated assessments
✅ Results they can trust
✅ Reports that actually help clients make informed decisions📖 Read the key takeaways here → https://pentest-tools.com/case-studies/elpha-secure
-
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if neededScanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
-
A Remote-Controlled USB Rubber Ducky Clone - Despite the repeated warnings of system administrators, IT personnel, and anyone ... - https://hackaday.com/2025/06/13/a-remote-controlled-usb-rubber-ducky-clone/ #keystrokeinjection #penetrationtesting #securityhacks #rubberducky #atmega16u2 #science #hak5
-
Researchers warn of ongoing Entra ID account takeover campaign https://www.helpnetsecurity.com/2025/06/12/researchers-warn-of-ongoing-entra-id-account-takeover-campaign/ #penetrationtesting #accountprotection #accounthijacking #MicrosoftEntraID #brute-force #Proofpoint #Don'tmiss #Hotstuff #News
-
👀 DefCamp 2024 felt like scanning a whole range of IPs - each moment unique, some wide open, others hidden, all worth exploring.
From the open ports of excitement to the filtered pings of exhaustion.
From flagged vulnerabilities in candid chats to firewalled moments of reflection.
And always, the steady pings of shared knowledge keeping us connected.▶️ Hit play and dive into the moods we scanned at DefCamp - every bit as rich and powerful as the tools we create.
#ethicalhacking #penetrationtesting #attacksurfacemanagement
-
Your next breakthrough might be one read away! Our most-read blogs of 2024 are packed with practical examples:
1️⃣ The XZ Utils Backdoor (CVE-2024-3094): Learn how this critical Linux vulnerability impacts SSH systems and how to secure against it.
2️⃣ The Ultimate List of Hacking Books: resources to master ethical hacking from beginner to expert.
3️⃣ Regresshion (CVE-2024-6387): Dive deep into this SSH vulnerability, with actionable insights for detecting and mitigating it.
💡 Bonus: Roundcube: Exfiltrating Emails with CVE-2021-44026: See how attackers exploited email systems and how you can prevent similar breaches (public exploit included!).
👇 Links are in the comments
#ethicalhacking #penetrationtesting #attacksurfacemanagement
-
🤹 We know most of you are juggling a ton of tools to stay on top of threats. There’s always something critical demanding your attention, so…
What’s the ONE thing you use the MOST in your work?
#ethicalhacking #penetrationtesting #attacksurfacemanagement