home.social

#penetrationtesting — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #penetrationtesting, aggregated by home.social.

  1. SERIOUSLY? AGAIN?

    I feel like all these bugs (see also Apache Server, Firefox, etc.) are being discovered with Mythos, and they're just slowly trying to patch as many as they can before releasing the 'New Model'.

    youtube.com/watch?v=8s9jaIPR7PU

    #cybersecurity #vulnerability #penetrationtesting

  2. World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

    Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: itsecurityguru.org/2026/05/07/

    #offensivesecurity #penetrationtesting

  3. Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.

    Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.

    45 minutes. Q&A included.

    Recording: youtube.com/watch?v=abGruzf2pPk

    #penetrationtesting #offensivesecurity #vulnerabilitymanagement

  4. CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.

    Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.

    One file. One click. Full RCE. CVSS 8.1, patched, fully documented.

    Write-up + PoC payloads: pentest-tools.com/blog/dotnetn

    More research from our team: pentest-tools.com/research

    #offensivesecurity #penetrationtesting #infosec

  5. Compliance evidence trails don't build themselves in the two weeks before an audit.
    Jan Pedersen walked through how continuous scanning handles that automatically: scheduled scans, before-and-after remediation proof, reports for both auditors and engineers.

    Recording: youtube.com/watch?v=HpuXoV_ngRQ
    Tomorrow: session two on AI, accuracy and what's next.
    1️⃣ 3:00 PM Bucharest / 1:00 PM London / 8:00 AM New York
    👉 zoom.us/webinar/register/WN_uM
    2️⃣ 7:00 PM Bucharest / 5:00 PM London / 12:00 PM New York / 9:00 AM Los Angeles
    👉 zoom.us/webinar/register/WN_xp
    #infosec #compliance #penetrationtesting

  6. Feeling a bit nostalgic publishing this; it's an older clip, and I definitely miss seeing Gynvael's stuff ... Hx8 Teaser 2 Highlights! (part 1)

    youtube.com/watch?v=6KGsshjzkEc

    #cybersecurity #exploit #penetrationtesting

  7. NEW BIML Bibliography entry

    arxiv.org/abs/2602.20021

    Agents of Chaos

    Natalie Shapira, et al.

    This is a solid, but very preliminary study of a set of specific agentic AI risks. The philosophy behind this work is driven by red teaming (as opposed to security engineering).

    #MLsec #Agents #PenetrationTesting

    berryvilleiml.com/bibliography/

  8. FuelCMS doesn't validate the Host header on password reset requests.

    Spoof it, trigger a reset for a valid user, and the app sends them a legitimate-looking email with your server in the link. They click. You get the token.

    PTT-2025-029 / CVE-2026-30459, CVSS 7.1 High. No fix coming (vendor's been quiet for ~4 years).
    Full PoC: pentest-tools.com/research

    #penetrationtesting #offensivesecurity

  9. 🛡️ El Curso de Hacking con Kali Linux está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: https://wa.me/51949304030 💻 https://www.reydes.com/e/Curso_de_Hacking_con_Kali_Linux #penetrationtesting #techeducation #cybersecuritytraining #techskills #cyberdefense #cyberawareness #kalilinux
  10. Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.

    We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.

    7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.

    enablesecurity.com/blog/introd

    GitHub: github.com/EnableSecurity/DVRT

    #infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN

  11. Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.

    We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.

    7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.

    enablesecurity.com/blog/introd

    GitHub: github.com/EnableSecurity/DVRT

    #infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN

  12. Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.

    We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.

    7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.

    enablesecurity.com/blog/introd

    GitHub: github.com/EnableSecurity/DVRT

    #infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN

  13. Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.

    We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.

    7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.

    enablesecurity.com/blog/introd

    GitHub: github.com/EnableSecurity/DVRT

    #infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN

  14. Two weeks ago we published our analysis of TURN security threats. Today: how to fix them.

    New guides covering implementation-agnostic best practices (IP range blocking, protocol hardening, rate limiting, deployment patterns) and coturn-specific configuration with copy-paste templates at three security levels.

    Best practices: enablesecurity.com/blog/turn-s
    coturn guide: enablesecurity.com/blog/coturn
    Config templates on GitHub: github.com/EnableSecurity/cotu

    coturn 4.9.0 dropped yesterday with fixes for CVE-2026-27624 (IPv4-mapped IPv6 bypass of deny rules) and an inverted web admin password check that had been broken since ~2019. The guides cover workarounds for older versions.

    #infosec #webrtc #security #TURN #coturn #penetrationtesting #voip #serversecurity

  15. TURN servers are meant to relay WebRTC media. To an attacker, they're just proxies.

    We wrote up the threats we've been finding since 2017: relay abuse, DoS amplification, and software vulns.

    enablesecurity.com/blog/turn-s

    #infosec #webrtc #security #TURN #penetrationtesting #voip

  16. New HTB walkthrough: REDEEMER (Tier 0) - Redis fundamentals for beginners.

    Redis is everywhere! Caching, session stores, job queues – and when it is exposed or misconfigured, it can leak sensitive data. I just published a beginner-focused walkthrough that covers:

    🔹 How sensitive data can be stored directly in memory
    🔹 What Redis is and common use cases
    🔹 Why you shouldn't expose Redis without authentication
    🔹 How to identify Redis with Nmap (port 6379)
    🔹 How to connect with "redis-cli", enumerate keys and databases
    🔹 Why "KEYS *" is fine for CTFs but use "SCAN" in production

    This is part of my ongoing Hack The Box Starting Point – Step-by-Step Walkthrough for Beginners series, where the goal is to help newcomers build strong fundamentals in ethical hacking.

    🎥 Watch the HTB Redeemer walkthrough here:

    youtube.com/watch?v=81JN1vy1HGY

    📂 Full playlist:

    youtube.com/playlist?list=PL2m

    If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

    Happy learning and keep hacking ethically 🔐

    #CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #redis

  17. 💡 Understanding core network protocols is fundamental for any aspiring cyber security professional. One of the most common that you will encounter is SMB (Server Message Block).

    In my latest video, I provide a detailed, beginner friendly walkthrough of the "DANCING" machine from Hack The Box, focusing entirely on SMB enumeration and access 🚀

    You will learn:
    🔹 What SMB (Server Message Block) is and how it works
    🔹 Common SMB ports (139 & 445) and why they matter
    🔹 How to use Nmap for targeted service enumeration such as SMB services
    🔹 How to enumerate SMB shares using smbclient
    🔹 Understanding anonymous / misconfigured shares
    🔹 Downloading files from SMB shares and capturing the flag

    This is a perfect starting point for anyone new to ethical hacking.

    🎥 Watch the HTB DANCING walkthrough here:

    youtube.com/watch?v=CpaBWeq9JU8

    📂 Full playlist:

    youtube.com/playlist?list=PL2m

    If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

    Happy learning and keep hacking ethically 🔐

    #CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #SMB

  18. Just published a new beginner-friendly walkthrough for Hack The Box Starting Point - FAWN (Tier 0).

    This machine is an excellent introduction to FTP (File Transfer Protocol) and helps beginners understand:
    🔹 How FTP works
    🔹 Why FTP is insecure by design
    🔹 What are the secure alternatives of FTP
    🔹 How attackers enumerate services using Nmap
    🔹 How anonymous FTP login works
    🔹 What is the man command
    🔹 How to retrieve files and capture the flag

    Instead of rushing through commands, this walkthrough explains the concepts behind every step, which is something I wish I had when I first started learning ethical hacking.

    If you are new to penetration testing or is an aspiring ethical hacker, Hack The Box Starting Point is a fantastic learning platform.

    🎥 Watch the FAWN walkthrough here:

    youtube.com/watch?v=SLFJOEq5w6Y

    📂 Full playlist:

    youtube.com/watch?v=OqxPRwP8t_

    If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

    Happy learning and keep hacking ethically 🔐

    #CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #FTP

  19. New Learning Tool Nmap Timing Visualizer

    In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguments fun and interactive.

    chickenpwny.github.io/NmapTimingTe...

    #Nmap #PenetrationTesting #NetworkScanning

  20. New tool: Interactive Nmap Timing Template Visualizer

    In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguements fun and interactive.

    chickenpwny.github.io/NmapTimi

    #Nmap #PenetrationTesting #NetworkScanning

  21. “A 250-page vuln report is useful for no one.”
    That’s how Elpha Secure’s CTO summed up their reality before using Pentest-Tools.com. And we can totally understand!

    Scattered tools and noise-heavy reports made scaling painful. Now, their team gets:

    ✅ Fast, automated assessments
    ✅ Results they can trust
    ✅ Reports that actually help clients make informed decisions

    📖 Read the key takeaways here → pentest-tools.com/case-studies

    #cyberinsurance #cybersecurity #penetrationtesting

  22. New mass scanning activity may be the first step in another MOVEit attack.

    Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.

    Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.

    If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.

    Now’s the time to:
    • Patch all known MOVEit vulnerabilities
    • Limit public-facing access
    • Monitor for scan activity and open ports
    • Block IPs identified by threat intelligence feeds
    • Harden file transfer environments and deploy honeypots if needed

    Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.

    Read the article for details: cuinfosecurity.com/scans-probi

    #MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting

  23. 👀 DefCamp 2024 felt like scanning a whole range of IPs - each moment unique, some wide open, others hidden, all worth exploring.

    From the open ports of excitement to the filtered pings of exhaustion.
    From flagged vulnerabilities in candid chats to firewalled moments of reflection.
    And always, the steady pings of shared knowledge keeping us connected.

    ▶️ Hit play and dive into the moods we scanned at DefCamp - every bit as rich and powerful as the tools we create.

    #ethicalhacking #penetrationtesting #attacksurfacemanagement

  24. Your next breakthrough might be one read away! Our most-read blogs of 2024 are packed with practical examples:

    1️⃣ The XZ Utils Backdoor (CVE-2024-3094): Learn how this critical Linux vulnerability impacts SSH systems and how to secure against it.

    2️⃣ The Ultimate List of Hacking Books: resources to master ethical hacking from beginner to expert.

    3️⃣ Regresshion (CVE-2024-6387): Dive deep into this SSH vulnerability, with actionable insights for detecting and mitigating it.

    💡 Bonus: Roundcube: Exfiltrating Emails with CVE-2021-44026: See how attackers exploited email systems and how you can prevent similar breaches (public exploit included!).

    👇 Links are in the comments

    #ethicalhacking #penetrationtesting #attacksurfacemanagement

  25. 🤹 We know most of you are juggling a ton of tools to stay on top of threats. There’s always something critical demanding your attention, so…

    What’s the ONE thing you use the MOST in your work?

    #ethicalhacking #penetrationtesting #attacksurfacemanagement