👇 https://sensepost.com/blog/2025/no-egress-no-shell-no-problem/
www | https://sensepost.com/blog |
https://twitter.com/sensepost |
www | https://sensepost.com/blog |
https://twitter.com/sensepost |
Attached: 1 image Wifi hacking can be a useful tool, but people are out here grinding on WPA2 handshake cracking tutorials & menu driven attack tooling. When we built the 3rd and latest iteration of the wifi hacking course for #BlackHat - we did it to show what really works and how it really works. 1/7
Unsatisfied with merely relying on reFlutter to do its magic, Jacques dove deep to understand how Flutter's SSL pinning in Android works, and how to intercept it with Frida.
The S is for Security. How to use WinRMS as a solid NTLM relay target, and why it’s less secure than WinRM over HTTP.
writeup: https://sensepost.com/blog/2025/is-tls-more-secure-the-winrms-case./
PR to impacket:
https://github.com/fortra/impacket/pull/1947/files
Whipped together a SOCKS5-over-any-transport feature today for the c2 & implant used in @sensepost purple teaming / emulation exercises.
Here I have a cURL request, over an ICMP channel, funnelling HTTP requests in and out via our implant :D
Fun! 😄🔥
Dropping Teams malware via the browser’s cache - part II of Aurélien’s Browser Cache Smuggling covers his Insomni’hack talk with end to end weaponisation https://sensepost.com/blog/2025/browser-cache-smuggling-the-return-of-the-dropper/
GLPI (popular in France & Brazil) versions 9.5.0 to 10.0.16 allows hijacking sessions of authenticated users remotely. The details and process of discovering the vulnerability is detailed by @GuilhemRioux here:
https://sensepost.com/blog/2025/leakymetry-circumventing-glpi-authentication/
Along with a vulnerability checking tool: https://github.com/Orange-Cyberdefense/glpwnme
Demo at https://youtu.be/OTaCV4-6qHE