Hacking Citrix Storefront Users

This article is in no way affiliated, sponsored, or endorsed with/by Citrix Systems, Inc. All graphics are being displayed under fair use for the purposes of this article. Hacking Citrix Storefront Users With the substantial shift from traditional work environments to remote/telework capable infrastructures due to COVID-19, products like Citrix [...]

By |2024-04-15T14:25:49+00:00May 26th, 2021|PENTESTING, SECURIFERA|0 Comments

BMC Patrol Agent – Domain User to Domain Admin – Part 2

**Securifera is in no way affiliated, sponsored, or endorsed with/by BMC. All graphics produced are in no way associated with BMC or it's products and were created solely for this blog post. All uses of the terms BMC, PATROL, and any other BMC product trademarks is intended only for identification purposes and is to [...]

By |2024-04-15T14:25:49+00:00March 8th, 2021|EXPLOITS, PENTESTING|0 Comments

Synack – Red Vs Fed Competition 2020

Preface Obligatory statement: This blog post is in no way affiliated, sponsored, or endorsed with/by Synack, Inc. All graphics are being displayed under fair use for the purposes of this article. Over the last few months Synack has been running a user engagement based competition called Red vs Fed. As can be deduced [...]

By |2024-04-15T14:25:50+00:00June 25th, 2020|BUG BOUNTY, EXPLOITS, PENTESTING|0 Comments

A Year of Windows Privilege Escalation Bugs

A Year of Windows Privilege Escalation Bugs Earlier last year I came across an article by Provadys (now Almond) highlighting several bugs they had discovered based on research by James Forshaw of Google's Project Zero. The research focused on the exploitation of Windows elevation of privilege (EOP) vulnerabilities using NTFS [...]

By |2024-04-15T14:25:50+00:00March 12th, 2020|BUG BOUNTY, EXPLOITS, PENTESTING|0 Comments

POC or Stop The Calc Popping Videos – CVE-2017-9830 – CVE-2019-7839

POC or STOP THE CALC POPPING VIDEOS As a red teamer / penetration tester / bug bounty hunter, I get exposed to a wide range of software products while performing customer engagements. Often times we find systems running outdated or unpatched services with publicly disclosed vulnerabilities only to find a video popping [...]

By |2024-04-15T14:25:51+00:00August 3rd, 2019|EXPLOITS, PENTESTING|0 Comments

HTTP screenshots with Nmap, Chrome, and Selenium

HTTP screenshots with Nmap, Chrome, and Selenium Several months back I tweeted out a gist of a simple website screenshot python script I wrote as an attempt to fill a gap in tooling that I couldn't seem to find anywhere. The options I was presented with were either too complex, inconsistent, or outdated. [...]

By |2024-04-15T14:25:51+00:00June 11th, 2019|PENTESTING, SECURIFERA|5 Comments

BMC Patrol Agent – Domain User to Domain Admin

**Important -  thanks to a nice cease and desist letter from BMC, I am obliged to explicitly state that Securifera is in no way affiliated, sponsored, or endorsed with/by BMC. All graphics produced are in no way associated with BMC or it's products and were created solely for this blog post. All uses of [...]

By |2024-04-15T14:25:51+00:00December 17th, 2018|PENTESTING|1 Comment

serviceFu

serviceFu In a recent assessment our team found itself in a somewhat new situation that resulted in a useful tool we wanted to share with the community. The assessment started with us gaining initial access into a customer's network. This particular customer had invested significant time and effort into [...]

By |2024-04-15T14:26:04+00:00October 7th, 2018|PENTESTING|0 Comments
Go to Top