What $2,000,000 in Bug Bounties Taught Me

RE: https://infosec.exchange/@enablesecurity/116300709031150946
VoIP/WebRTC security has needed a DVWA equivalent for a long time. We built DVRTC: full dockerized VoIP stack, intentionally vulnerable, 7 guided exercises.
Live instance at pbx1.dvrtc.net — try it now.
https://www.enablesecurity.com/blog/introducing-dvrtc-damn-vulnerable-real-time-communications/
#infosec #webrtc #voipsecurity #penetrationtesting #training
Web application security has DVWA and WebGoat. VoIP and WebRTC security hasn't had anything like it ... until now.
We built DVRTC (Damn Vulnerable Real-Time Communications): a hands-on lab for learning VoIP/WebRTC attack techniques. Full dockerized stack with Kamailio, Asterisk, rtpengine, and coturn — each configured to exhibit specific vulnerable behaviors.
7 exercises covering SIP extension enumeration, RTP bleed, SIP digest leaks, credential cracking (online and offline), TURN relay abuse, and traffic analysis. There's a live instance at pbx1.dvrtc.net you can test against right now.
https://www.enablesecurity.com/blog/introducing-dvrtc-damn-vulnerable-real-time-communications/
GitHub: https://github.com/EnableSecurity/DVRTC/
#infosec #webrtc #voipsecurity #sipsecurity #penetrationtesting #training #TURN
NTLM-Relaying in 2026 | SecCore GmbH
https://seccore.at/blog/ntlmrelay1/
Short summary: https://hackerworkspace.com/article/ntlm-relaying-in-2026-seccore-gmbh

NTLM-Relaying is a common attack vector in internal networks. In this blog post, we will show that even in 2026, there are still many scenarios where NTLM-Relaying can be successfully performed, and we will provide some insights into how to mitigate these risks.
Da werde ich wohl ein Update durchführen 😜
#KaliLinux 2026.1 bringt neue Tools mit und erstrahlt in neuer oder Retro-Optik | Security https://www.heise.de/news/Kali-Linux-2026-1-bringt-neue-Tools-mit-und-erstrahlt-in-neuer-oder-Retro-Optik-11223739.html #Linux
#PenTest #PenTesting #PenetrationTesting
How Hackers Find Anyone's Password Easily

Bug Bounty Hunting | Using Burpsuite's Match & Replace Rules to Find IDORS and Break Applications
