ptonewreckin (25)in #security • 6 years agoRevenge of the Sticky Keys - An Exercise In Privilege Escalation and PersistenceA while back I was messing with the Pupy framework and decided to write a fun module for persistence/privilege…ptonewreckin (25)in #security • 6 years agoDirect Object References - What are they and how can we stop them!!?During an interview a few years back I was asked, "If you had the power to remove any application-related…ptonewreckin (25)in #security • 6 years agoGymnastics with SSHLet's say you travel a lot or are on vacation in Greece. Is Greece awesome? You're goddamn right it is - Dining above…ptonewreckin (25)in #security • 6 years agoWindows + PythonA quick way to setup Python in Windows. Download Chocolatey - A package manager for Windows. choco install python2…ptonewreckin (25)in #security • 6 years agoGetting Jumpy With The Bash BunnyAfter weeks of waiting I've finally obtained my Bash Bunny. Essentially, the Bash Bunny serves as a small piece of…ptonewreckin (25)in #security • 6 years agoSSH Tunneling In WindowsEver wanted to use SSH on Windows? There are several tools we can use to do so including Plink/Putty/Bitvise. While…ptonewreckin (25)in #security • 6 years agoExploiting XXEXML External Entity (XXE) Injection: The vuln that keeps on giving... XXE Injection can occur when XML parsers are…