PIC Symphony
#rastamouse
Raffi just released another update to Crystal Palace, which serves to improve the way specification files are handled by making them more modular.
Tradecraft Orchestration in the Garden
What’s more relaxing than a beautiful fall day, a crisp breeze, a glass of Sangria, and music from the local
via Rasta Mouse Blog
#rastamouse
Raffi just released another update to Crystal Palace, which serves to improve the way specification files are handled by making them more modular.
Tradecraft Orchestration in the Garden
What’s more relaxing than a beautiful fall day, a crisp breeze, a glass of Sangria, and music from the local
via Rasta Mouse Blog
What Will Shape Cybersecurity in 2026: AI Speed, Expanding Attack Surfaces, and Specialized Red Teams
#bishopfox
2026 will hit cybersecurity like a fast-forward button: AI moves quicker than governance, attack surfaces sprawl into the physical world, and red teams get hyper-specialized. Here’s what’s coming—and how to stay ahead before “optional” becomes “too late.”
via BishopFox Blog
#bishopfox
2026 will hit cybersecurity like a fast-forward button: AI moves quicker than governance, attack surfaces sprawl into the physical world, and red teams get hyper-specialized. Here’s what’s coming—and how to stay ahead before “optional” becomes “too late.”
via BishopFox Blog
What is a TrustedSec Program Maturity Assessment (PMA)?
#trustedsec
The TrustedSec PMA is a tactical approach to evaluating the components, efficiency, and overall maturity of an organization’s Information Security program.Unlike a traditional compliance audit, the PMA is designed as a…
via TrustedSec Blog (author: Jonathan White)
#trustedsec
The TrustedSec PMA is a tactical approach to evaluating the components, efficiency, and overall maturity of an organization’s Information Security program.Unlike a traditional compliance audit, the PMA is designed as a…
via TrustedSec Blog (author: Jonathan White)
Arista NextGen Firewall XSS to RCE Chain
#bishopfox
Arista flagged three NG Firewall bugs as “limited.” Our researchers proved otherwise: real-world remote code execution is possible, and current patches don’t fully fix the root issues. Here’s what’s vulnerable, what we validated, and the steps to cut exposure now.
via BishopFox Blog
#bishopfox
Arista flagged three NG Firewall bugs as “limited.” Our researchers proved otherwise: real-world remote code execution is possible, and current patches don’t fully fix the root issues. Here’s what’s vulnerable, what we validated, and the steps to cut exposure now.
via BishopFox Blog
How to detect React2Shell with Burp Suite
#portswigger
Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are now scannable across Burp Suite, making it fast to validate your exposure and begin automated coverage usi
via PortSwigger Blog
#portswigger
Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are now scannable across Burp Suite, making it fast to validate your exposure and begin automated coverage usi
via PortSwigger Blog
Ghostwriter v6.1 — Playing Fetch with BloodHound
#specterops
Ghostwriter v6.1 introduces a full-featured BloodHound integration that lets you import BloodHound data and findings directly within your projects, alongside new collaborative project notes, upgraded caption editor objects, and a collection of usability, SSO/MFA, and template improvements. This release streamlines workflows, enhances team collaboration, and tightens the connection between assessment tooling and reporting.
via SpecterOps Blog (author: Christopher Maddalena)
#specterops
Ghostwriter v6.1 introduces a full-featured BloodHound integration that lets you import BloodHound data and findings directly within your projects, alongside new collaborative project notes, upgraded caption editor objects, and a collection of usability, SSO/MFA, and template improvements. This release streamlines workflows, enhances team collaboration, and tightens the connection between assessment tooling and reporting.
via SpecterOps Blog (author: Christopher Maddalena)
A Remote Pre-Authentication Overflow in LLDB's debugserver
#objectivesee
In this guest blog post, Nathaniel Oh, details a recent bug he discovered and reported to Apple: a remote pre-authentication buffer overflow in LLDB’s debugserver, now patched as CVE-2025-43504.
via Objective-See Blog
#objectivesee
In this guest blog post, Nathaniel Oh, details a recent bug he discovered and reported to Apple: a remote pre-authentication buffer overflow in LLDB’s debugserver, now patched as CVE-2025-43504.
via Objective-See Blog
The Fragile Lock: Novel Bypasses For SAML Authentication
#portswigger
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
via PortSwigger Research
#portswigger
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
via PortSwigger Research
Holy Shuck! Weaponizing NTLM Hashes as a Wordlist
#trustedsec
<p>Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most IT teams recognize the risk, but longer passwords and password…</p>
via TrustedSec Blog (author: Austin Coontz)
#trustedsec
<p>Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most IT teams recognize the risk, but longer passwords and password…</p>
via TrustedSec Blog (author: Austin Coontz)
Git SCOMmit – Putting the Ops in OpsMgr
#specterops
TL;DR Yet another System Center Ludus configuration for your collection. https://github.com/Synzack/ludus_scom Intro As you may know, here at SpecterOps we have been big on SCCM. See https://specterops.io/blog/category/research/?s=sccm. But SCCM is only a part of the larger Microsoft System Center product suite. Among the suite’s other offerings is System Center Operations Manager, more commonly recognized by […]
via SpecterOps Blog (author: Zach Stein)
#specterops
TL;DR Yet another System Center Ludus configuration for your collection. https://github.com/Synzack/ludus_scom Intro As you may know, here at SpecterOps we have been big on SCCM. See https://specterops.io/blog/category/research/?s=sccm. But SCCM is only a part of the larger Microsoft System Center product suite. Among the suite’s other offerings is System Center Operations Manager, more commonly recognized by […]
via SpecterOps Blog (author: Zach Stein)
Linux Process Injection via Seccomp Notifier
#outflank
This post demonstrates the use of seccomp user notifications to inject a shared library into a Linux process. I haven’t seen this combination documented as a process injection technique before, and it has some benefits over alternatives. In summary, seccomp user notifications enable user-space injection from parent to child without any
1. Seccomp user notifications were introduced in Linux kernel version 5.0, but this PoC relies on
2. Requires you to create the target process (parent-to-child injection only).
3. The injected code runs with the same UID, namespaces, and LSM label as the target process.
via Outflank Blog (author: Kyle Avery)
#outflank
This post demonstrates the use of seccomp user notifications to inject a shared library into a Linux process. I haven’t seen this combination documented as a process injection technique before, and it has some benefits over alternatives. In summary, seccomp user notifications enable user-space injection from parent to child without any
LD_* environment variables or privileged capabilities, regardless of the ptrace_scope configuration. However, seccomp user notifications have some notable limitations:1. Seccomp user notifications were introduced in Linux kernel version 5.0, but this PoC relies on
SECCOMP_ADDFD_FLAG_SEND (Linux 5.14+) to avoid TOCTOU issues when hooking openat.2. Requires you to create the target process (parent-to-child injection only).
3. The injected code runs with the same UID, namespaces, and LSM label as the target process.
via Outflank Blog (author: Kyle Avery)
Operationalizing BloodHound Enterprise: Security automation with Tines
#specterops
BloodHound Enterprise gives you all the pieces you need: the data, the analysis, the visualizations. What we don’t dictate is how you put it all together. Your workflows, your tools, your SOC. This is the first post in our ‘Operationalizing BloodHound Enterprise’ series, showing practical ways to integrate BHE into your security operations. Theoretical risk […]
via SpecterOps BH Blog (author: Hugo van den Toorn)
#specterops
BloodHound Enterprise gives you all the pieces you need: the data, the analysis, the visualizations. What we don’t dictate is how you put it all together. Your workflows, your tools, your SOC. This is the first post in our ‘Operationalizing BloodHound Enterprise’ series, showing practical ways to integrate BHE into your security operations. Theoretical risk […]
via SpecterOps BH Blog (author: Hugo van den Toorn)
A Hacker Holiday Gift Guide: 2025 Edition
#bishopfox
Shopping for a hacker? Skip the gimmicks. Here are the tools, training, and books they actually want: Flipper Zero, Proxmark3, Shodan, HTB, and must-read vuln research picks, perfect for deal-season lab upgrades.
via BishopFox Blog
#bishopfox
Shopping for a hacker? Skip the gimmicks. Here are the tools, training, and books they actually want: Flipper Zero, Proxmark3, Shodan, HTB, and must-read vuln research picks, perfect for deal-season lab upgrades.
via BishopFox Blog
SCOMmand and Conquer – Attacking System Center Operations Manager (Part 1)
#specterops
TL:DR SCOM suffers from similar insecure default configurations as its SCCM counterpart, enabling attackers to escalate privileges, harvest credentials, and ultimately compromise the entire management group and its monitored infrastructure. Intro At this point, I think it’s acceptable for me to just start each blog with a screenshot of Duane triggering me to look into […]
via SpecterOps Blog (author: Garrett Foster)
#specterops
TL:DR SCOM suffers from similar insecure default configurations as its SCCM counterpart, enabling attackers to escalate privileges, harvest credentials, and ultimately compromise the entire management group and its monitored infrastructure. Intro At this point, I think it’s acceptable for me to just start each blog with a screenshot of Duane triggering me to look into […]
via SpecterOps Blog (author: Garrett Foster)
SCOMmand And Conquer – Attacking System Center Operations Manager (Part 2)
#specterops
TL;DR: We found that SCOM RunAs credentials could be obtained on-host and also off-host in certain configurations and wrote a tool to help automate their recovery. To skip straight to the tool, go here https://github.com/breakfix/SharpSCOM Introduction In our previous blog post, we demonstrated a series of attacks focused on attacking the SCOM server directly. Specifically, […]
via SpecterOps Blog (author: Matt Johnson)
#specterops
TL;DR: We found that SCOM RunAs credentials could be obtained on-host and also off-host in certain configurations and wrote a tool to help automate their recovery. To skip straight to the tool, go here https://github.com/breakfix/SharpSCOM Introduction In our previous blog post, we demonstrated a series of attacks focused on attacking the SCOM server directly. Specifically, […]
via SpecterOps Blog (author: Matt Johnson)
DAST without disruption: Burp Suite DAST winter update 2025
#portswigger
AppSec teams are under constant pressure to secure fast-moving applications without slowing anything down. But scanning windows, fragile authentication, and sprawling API estates often get in the way
via PortSwigger Blog
#portswigger
AppSec teams are under constant pressure to secure fast-moving applications without slowing anything down. But scanning windows, fragile authentication, and sprawling API estates often get in the way
via PortSwigger Blog
Azure Seamless SSO: When Cookie Theft Doesn’t Cut It
#specterops
TL;DR The cookie crumbled when it expired, but the attack path didn’t. Learn how BloodHound graph analysis and Azure Seamless SSO enabled pivoting into the cloud. There’s nothing worse than stealing some cookies, just to find out they’ve gone bad and expired. However, that doesn’t mean lateral movement into the cloud is off the table. […]
via SpecterOps Blog (author: Andrew Gomez)
#specterops
TL;DR The cookie crumbled when it expired, but the attack path didn’t. Learn how BloodHound graph analysis and Azure Seamless SSO enabled pivoting into the cloud. There’s nothing worse than stealing some cookies, just to find out they’ve gone bad and expired. However, that doesn’t mean lateral movement into the cloud is off the table. […]
via SpecterOps Blog (author: Andrew Gomez)
Burp On Tour 2025: bringing the AppSec community together around the world
#portswigger
In 2025, we set out with a simple mission: take Burp Suite on the road and meet the global AppSec community where you are. Burp On Tour was born from our desire to learn from you; the brilliant people
via PortSwigger Blog
#portswigger
In 2025, we set out with a simple mission: take Burp Suite on the road and meet the global AppSec community where you are. Burp On Tour was born from our desire to learn from you; the brilliant people
via PortSwigger Blog
ActivID administrator account takeover : the story behind HID-PSA-2025-002
#synacktiv
via Synacktiv Blog (author: Vincent Herbulot)
#synacktiv
via Synacktiv Blog (author: Vincent Herbulot)
Top 10 Blogs of 2025
#trustedsec
Everyone has a year-end list, and this is ours. See what our top-performing cybersecurity blogs were in 2025, there could be some you might have missed!
via TrustedSec Blog
#trustedsec
Everyone has a year-end list, and this is ours. See what our top-performing cybersecurity blogs were in 2025, there could be some you might have missed!
via TrustedSec Blog