478 Followers
74 Following
124 Posts
Orange Cyberdefense's SensePost Team
wwwhttps://sensepost.com/blog
twitterhttps://twitter.com/sensepost

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (@defte_), including instructions for reproducing the test environment yourself.

https://sensepost.com/blog/2025/a-journey-implementing-channel-binding-on-mssqlclient.py/

Adriaan was struggling to get an interactive shell on the *nix app server he had popped, so he wrote a turn-based mini binary to give you a semi-interactive shell in restrictive environments. Writeup & code are at

👇
https://sensepost.com/blog/2025/no-egress-no-shell-no-problem/

Unsatisfied with merely relying on reFlutter to do its magic, Jacques dove deep to understand how Flutter's SSL pinning in Android works, and how to intercept it with Frida.

https://sensepost.com/blog/2025/intercepting-https-communication-in-flutter-going-full-hardcore-mode-with-frida/

SensePost | Intercepting https communication in flutter: going full hardcore mode with frida

Leaders in Information Security

The S is for Security. How to use WinRMS as a solid NTLM relay target, and why it’s less secure than WinRM over HTTP.

writeup: https://sensepost.com/blog/2025/is-tls-more-secure-the-winrms-case./

PR to impacket:
https://github.com/fortra/impacket/pull/1947/files

SensePost | Is tls more secure? the winrms case.

Leaders in Information Security

Dropping Teams malware via the browser’s cache - part II of Aurélien’s Browser Cache Smuggling covers his Insomni’hack talk with end to end weaponisation https://sensepost.com/blog/2025/browser-cache-smuggling-the-return-of-the-dropper/

Demo: https://youtu.be/tIveWYfYcCI

SensePost | Browser cache smuggling: the return of the dropper

Leaders in Information Security

GLPI (popular in France & Brazil) versions 9.5.0 to 10.0.16 allows hijacking sessions of authenticated users remotely. The details and process of discovering the vulnerability is detailed by @GuilhemRioux here:
https://sensepost.com/blog/2025/leakymetry-circumventing-glpi-authentication/

Along with a vulnerability checking tool: https://github.com/Orange-Cyberdefense/glpwnme

Demo at https://youtu.be/OTaCV4-6qHE

SensePost | Leakymetry: circumventing glpi authentication

Leaders in Information Security

Using frida-trace to hook thousands of methods in one go and get clean, readable output for large, obfuscated mobile apps 📲. Another post from Reino’s to level up your dynamic analysis: https://sensepost.com/blog/2025/using-improving-frida-trace/
SensePost | Using & improving frida-trace

Leaders in Information Security

Reino takes his NoSQL injection series a bit further with (maybe) new techniques for more efficient error based NoSQL injections in this follow up post: https://sensepost.com/blog/2025/nosql-error-based-injection/
SensePost | Nosql error-based injection

Leaders in Information Security

Want a hacker's introduction to using neural networks to create a tool to bypass CAPTCHAs? Adriaan's got you.

Writeup: https://sensepost.com/blog/2025/capchan-solving-captcha-with-image-classification/

Accompanying training/classifying tool capchan https://github.com/sensepost/capchan/

SensePost | Capchan – solving captcha with image classification

Leaders in Information Security

A look at some of the trickier NoSQL injection scenarios from Reino. With ways of manipulating the query to deal with pre/post conditions successfully https://sensepost.com/blog/2025/getting-rid-of-pre-and-post-conditions-in-nosql-injections/
SensePost | Getting rid of pre- and post-conditions in nosql injections

Leaders in Information Security