Tags Ethical exploitationLearn about ethical ways to exploit systems to find and report vulnerabilities and enhance security posture. Buffer Overflows and Authentication Bypasses - exploiting CVE-2025-0282 and CVE-2024-55591A critical Ivanti flaw lets attackers bypass defenses faster than you can patch. But that's not all. A silent vulnerability lurks in Fortinet, too.Author(s)Iulian TitaPublished at28 Feb 2025Updated at28 Feb 2025Cross-site WebSocket hijacking: understanding and exploiting CSWSHThis is an example of why it's worth taking a look in all the "boring" places (think RFC). They just might help you find the vulnerability you've been searching for!Author(s)Sacha IakovenkoPublished at30 Oct 2024Updated at05 Nov 2024Visualize exploit paths with the Sniper network graphWhether working in offensive or defensive security, we all see it: high-risk, widespread vulnerabilities cause significant disruptions to already struggling security teams.Author(s)Andra ZahariaPublished at23 Jun 2022Updated at24 May 2024January updates: new pentest robots and stronger integration“Great for streamlining any security engagement” is the kind of feedback that keeps us working to roll our monthly updates. Here’s what we did last month to honor this commitment.Author(s)Ioana RijnetuPublished at18 Feb 2022Updated at25 Jul 2022Behind the scenes – an interview with Adrian Furtuna, our founder and CEOAs cybercrime continues to escalate, businesses are increasingly prioritizing their cybersecurity strategies, often embracing penetration testing to address the most burning threats. Although this established practice is highly effective, there are still many necessary improvements to help scale it to the current needs of the tech ecosystem. CyberNews sat down with Adrian Furtuna, our Founder & CEO, to talk about the ins and outs of penetration testing. Here’s why Adrian believes that no matter how advanced the technology is, some aspects still need a human approach.Author(s)Ioana RijnetuPublished at16 Feb 2022Updated at14 Oct 2024How to detect and exploit the Oracle WebLogic RCE (CVE-2020-14882 & CVE-2020-14883)Pentesters love a good RCE, but, as much as we enjoy the thrill of detecting and exploiting it (ethically, of course), the tech ecosystem suffers every time one of these pops up. That’s why fast and effective recon and vulnerability assessment remain the go-to pentesting stages that help companies manage their risks so they can keep doing business and serving their customers. With your knowledge, experience, and advice, they can turn a potential hazard into a process that makes them stronger. Let’s take a closer look at the critical RCE vulnerability discovered in Oracle WebLogic Server and see how you can have a bigger positive impact in your organization and beyond it.Author(s)Catalin IovitaPublished at02 Feb 2022Updated at01 Apr 2024How to detect and exploit CVE-2021-26084, the Confluence Server RCEThinking like an attacker is the right mindset that can help you better cope with this staggering growth of RCE vulnerabilities. As a pentester, you know it better than anyone. You’re also the best positioned to use your experience and know-how to detect exposed critical assets before malicious actors do. To help you help others, I’ll explore a critical RCE vulnerability in the Atlassian Confluence server across Linux and Windows in this practical guide packed with detection tactics and mitigation methods.Author(s)Iulian TitaPublished at31 Jan 2022Updated at24 Mar 2023How to exploit the VMware vCenter RCE with Pentest-Tools.com (CVE-2021-21985)More high-risk vulnerabilities mean more work for you. The good news? You won’t be out of work anytime soon. The bad news? You’ll probably work a lot more than you anticipate. So how do you balance the good and the not-so-great? By having a replicable process for when a high-risk CVE that leads to RCE hits your targets (the likes of CVE-2021-21985).Author(s)Stefan IridonPublished at25 Jan 2022Updated at13 Apr 2023How we detect and exploit Log4Shell to help you find targets using vulnerable Log4j versionsWe’re breaking down our technique for detecting CVE-2021-44228 (Log4Shell) because we believe our users should understand what’s happening behind the scanners so they can avoid a false sense of security.Author(s)Adrian FurtunaPublished at17 Dec 2021Updated at15 Oct 2024Detect and exploit Gitlab CE/EE RCE with Pentest-Tools.com (CVE-2021-22205)“Just patch it!” is the usual advice when a vulnerability hits (and it’s not a zero-day). But it’s never that simple in organizations that have to manage layers upon layers of infrastructure. When you have to deal with a critical CVE like the latest unauthenticated RCE in Gitlab (CVSSv3 10.0), the tangled, messy process of patching bubbles to the surface.Author(s)Daniel BecheneaPublished at05 Nov 2021Updated at12 Jul 2023Why Zerologon is the silent threat in your networkNo red flags. No alerts. Full-on compromise. The way cybercriminals are putting together various vulnerabilities within the Microsoft infrastructure, including Zerologon vulnerability (CVE-2020-1472), is more than a trending topic in the infosec community. It’s a massive threat for organizations small and large.Author(s)Cristian CorneaPublished at21 Oct 2020Updated at18 Jul 2023
Buffer Overflows and Authentication Bypasses - exploiting CVE-2025-0282 and CVE-2024-55591A critical Ivanti flaw lets attackers bypass defenses faster than you can patch. But that's not all. A silent vulnerability lurks in Fortinet, too.Author(s)Iulian TitaPublished at28 Feb 2025Updated at28 Feb 2025
Cross-site WebSocket hijacking: understanding and exploiting CSWSHThis is an example of why it's worth taking a look in all the "boring" places (think RFC). They just might help you find the vulnerability you've been searching for!Author(s)Sacha IakovenkoPublished at30 Oct 2024Updated at05 Nov 2024
Visualize exploit paths with the Sniper network graphWhether working in offensive or defensive security, we all see it: high-risk, widespread vulnerabilities cause significant disruptions to already struggling security teams.Author(s)Andra ZahariaPublished at23 Jun 2022Updated at24 May 2024
January updates: new pentest robots and stronger integration“Great for streamlining any security engagement” is the kind of feedback that keeps us working to roll our monthly updates. Here’s what we did last month to honor this commitment.Author(s)Ioana RijnetuPublished at18 Feb 2022Updated at25 Jul 2022
Behind the scenes – an interview with Adrian Furtuna, our founder and CEOAs cybercrime continues to escalate, businesses are increasingly prioritizing their cybersecurity strategies, often embracing penetration testing to address the most burning threats. Although this established practice is highly effective, there are still many necessary improvements to help scale it to the current needs of the tech ecosystem. CyberNews sat down with Adrian Furtuna, our Founder & CEO, to talk about the ins and outs of penetration testing. Here’s why Adrian believes that no matter how advanced the technology is, some aspects still need a human approach.Author(s)Ioana RijnetuPublished at16 Feb 2022Updated at14 Oct 2024
How to detect and exploit the Oracle WebLogic RCE (CVE-2020-14882 & CVE-2020-14883)Pentesters love a good RCE, but, as much as we enjoy the thrill of detecting and exploiting it (ethically, of course), the tech ecosystem suffers every time one of these pops up. That’s why fast and effective recon and vulnerability assessment remain the go-to pentesting stages that help companies manage their risks so they can keep doing business and serving their customers. With your knowledge, experience, and advice, they can turn a potential hazard into a process that makes them stronger. Let’s take a closer look at the critical RCE vulnerability discovered in Oracle WebLogic Server and see how you can have a bigger positive impact in your organization and beyond it.Author(s)Catalin IovitaPublished at02 Feb 2022Updated at01 Apr 2024
How to detect and exploit CVE-2021-26084, the Confluence Server RCEThinking like an attacker is the right mindset that can help you better cope with this staggering growth of RCE vulnerabilities. As a pentester, you know it better than anyone. You’re also the best positioned to use your experience and know-how to detect exposed critical assets before malicious actors do. To help you help others, I’ll explore a critical RCE vulnerability in the Atlassian Confluence server across Linux and Windows in this practical guide packed with detection tactics and mitigation methods.Author(s)Iulian TitaPublished at31 Jan 2022Updated at24 Mar 2023
How to exploit the VMware vCenter RCE with Pentest-Tools.com (CVE-2021-21985)More high-risk vulnerabilities mean more work for you. The good news? You won’t be out of work anytime soon. The bad news? You’ll probably work a lot more than you anticipate. So how do you balance the good and the not-so-great? By having a replicable process for when a high-risk CVE that leads to RCE hits your targets (the likes of CVE-2021-21985).Author(s)Stefan IridonPublished at25 Jan 2022Updated at13 Apr 2023
How we detect and exploit Log4Shell to help you find targets using vulnerable Log4j versionsWe’re breaking down our technique for detecting CVE-2021-44228 (Log4Shell) because we believe our users should understand what’s happening behind the scanners so they can avoid a false sense of security.Author(s)Adrian FurtunaPublished at17 Dec 2021Updated at15 Oct 2024
Detect and exploit Gitlab CE/EE RCE with Pentest-Tools.com (CVE-2021-22205)“Just patch it!” is the usual advice when a vulnerability hits (and it’s not a zero-day). But it’s never that simple in organizations that have to manage layers upon layers of infrastructure. When you have to deal with a critical CVE like the latest unauthenticated RCE in Gitlab (CVSSv3 10.0), the tangled, messy process of patching bubbles to the surface.Author(s)Daniel BecheneaPublished at05 Nov 2021Updated at12 Jul 2023
Why Zerologon is the silent threat in your networkNo red flags. No alerts. Full-on compromise. The way cybercriminals are putting together various vulnerabilities within the Microsoft infrastructure, including Zerologon vulnerability (CVE-2020-1472), is more than a trending topic in the infosec community. It’s a massive threat for organizations small and large.Author(s)Cristian CorneaPublished at21 Oct 2020Updated at18 Jul 2023