by Lorenzo Vogelsang | Jan 18, 2019
Introduction There is a lot of hype around A.I. as it’s being presented as the next candidate for a ground-breaking technological disruption. While this is certainly happening for some specific areas such as the smart-home devices ecosystem, others like...
by secforce | Jun 27, 2017
Our latest adventures took us to the magical world of… FIX protocols! The Financial Information eXchange (FIX) protocol manages the processing of real-time exchanged information within Financial Markets. It was originally authored in 1992 and became very famous...
by Rodrigo Marcos | Apr 13, 2017
MySQL server is affected by a remote DoS attack, which could be exploited by a remote unauthenticated attacker to cause a loss of availability on the targeted service. The issue has been verified to affect 5.6.X branch up to 5.6.35 and 5.7.X branch up to 5.7.17. It is...
by Rodrigo Marcos | Apr 6, 2017
In this post we are going to explain how we used iptables to bypass an Intrusion Prevention System during a recent penetration test. During the first phase of a penetration test on a /24 network, we started performing routinary network port scan to identify available...
by Antonio Quina | Jan 5, 2015
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his/her toolkit and by...
by Nikos Vassakis | Nov 24, 2014
Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. Due to popular demand, in this new version, Tunna (v1.1a) can be set up to be a local SOCKS proxy, that will accept any TCP traffic and send over to the webserver using HTTP requests....