White Papers
-
Polyglots: A Chameleon’s Best Friend
Introduction What are polyglots? Polyglots in a security context; are files which can be interpreted as multiple valid…
-
Timeroasting: An Introduction to NTP Hacking
Introduction Timeroasting is a classification of attack which targets a system’s management of time. Compared to other categories…
-
Wireless Network Vulnerabilities: An Introduction to Wi-Fi Hacking
Introduction to Wi-Fi Wi-Fi is a wireless network technology that allows devices to connect to the internet and…
-
HTTP Request Smuggling: From RFC to Real-World Impact
Introduction HTTP request smuggling is a web application vulnerability that leverages discrepancies and ambiguity in how frontend and…
-
Kubernetes Volumes: Command Injection Heaven
Introduction Kubernetes, the automation and containerisation platform, has a function for sharing files between nodes and pods named…
-
CUPS: Exploring the Recent RCE
Introduction On the 26th of September 2024, Simone Margaritelli, also known as ‘Evilsocket’ disclosed, publicly, four vulnerabilities within…
-
Common Vulnerabilities in Kubernetes
Introduction to Kubernetes Kubernetes is an open-source platform used for automating the deployment and management of containerised applications….
-
TCACHE Heap Exploitation
Introduction Building on top of the previous white paper on “Binary Exploitation Techniques”, this white paper will be…
-
Microsoft Company Portal – iOS Pin Code bypass for Persistence
On a recent engagement I was tasked to conduct a penetration test against an Intune enrolled iPhone with…