#Pentesting

2026-01-25

New blog post!
This is the longest one in quite a while.

Last year, I held a presentation about the basics of Active Directory pentesting, focusing on "quick-wins", easy to exploit vulnerabilities with huge impact.
I turned that presentation into a blog post.

The result is a surface-level overview of some of the most severe Active Directory vulnerabilities.

I hope it can be useful for aspiring pentesters and Active Directory admins alike.

ti-kallisti.com/general/ms/ad-

#redteam #pentesting #infosec #ActiveDirectory #sysadmin #Microsoft #Windows

Paco (2026: New) Hopepaco@infosec.exchange
2026-01-25

@cR0w The ATMs rebooted every day at 5:00am. The AUTOEXEC.BAT had like 5 instances of HIDESTART.EXE trying to hide the start menu during boot.

These machines had dozens of plaintext files with the full, raw, magnetic stripe track data from every card it had handled in the last 30 days.

My contact told me that one day, some drunk was walking past one of these and saw it reboot. He caught the start menu and started exploring. Did he open notepad and start perusing credit card and debit card data?

No. He opened up MS paint, made it full screen, drew a crude penis using the touch screen, and walked off.

@RickiTarr

#pentesting #pentest

2026-01-24

NetExec Lab is a set of hands-on labs used in the NetExec workshop and CTF to help you mastering NetExec for your next pentest engagement.

github.com/Pennyw0rth/NetExec-

#infosec #pentesting

dan_nannidan_nanni
2026-01-23

If you know how a program is laid out in memory, it becomes much easier to see where attacks can land and why certain defenses succeed or fail.

This is what the memory layout of a typical 64-bit Linux process looks like 😎👇

Find high-res pdf books with all my Linux related infographics from study-notes.org

2026-01-22

Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.

The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.

This reinforces the need to treat non-production assets as part of the threat surface.

Source: bleepingcomputer.com/news/secu

Follow @technadu for neutral, research-driven security reporting.

#CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu

Hackers exploit security testing apps to breach Fortune 500 firms
Chema Alonso :verified:chemaalonso@ioc.exchange
2026-01-22

El lado del mal - Sólo hasta el Domingo 25 de Enero. Código de Rebajas de Enero 2026 en 0xWord: Cupón REBAJAS2026 y descuentos con Tempos de MyPublicInbox elladodelmal.com/2026/01/solo- #0xWord #Ciberseguridad #Libros #CálicoElectrónico #HAcking #Pentesting #IA

dan_nannidan_nanni
2026-01-21

Android apps give pentesters a portable, always-on toolkit that enables real-time reconnaissance, traffic analysis, and on-the-spot testing directly from the field without needing a full laptop setup.

Here are some of Android apps that are useful for pentesting 😎👇

Find high-res pdf books with all my cybersecurity related infographics from study-notes.org

2026-01-20

Extracts browser-stored data such as refresh tokens, cookies, saved credentials and more from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX and Vivaldi).

github.com/Maldev-Academy/Dump

#infosec #pentesting #redteam

2026-01-20

Here are the top 10 ways you can stop findings from slipping through the cracks with Pentest-Tools.com :

1️⃣ Keep every finding in one place (from automated scans + manual tests)
2️⃣ Mark findings as "Open", "Fixed", "Accepted", or "False positive" to keep them accurate
3️⃣ Get automatic proof for every finding (and add more manually if you need it)
4️⃣ Track fixes with scan diffs and validate remediation
5️⃣ Use workspaces to keep findings grouped automatically, then report fast and avoid data spills
6️⃣ Filter out informational findings and focus on high-risk issues to make your time count
7️⃣ Push findings to Jira, Nucleus, or your CI/CD workflow without copy-paste pain
8️⃣ Get technical details, remediation steps, evidence, and attack replay in every finding
9️⃣ Import Burp results and add manual findings to keep reports comprehensive
🔟 Re-test fixes and catch regression before attackers do

#offensivesecurity #cybersecurity #infosec #pentesting

Track every finding from discovery to fix:

pentest-tools.com/features/fin

10 ways we keep vulnerabilities from getting lost with Pentest-Tools.com
Bart Karalus ➡️ FOSDEMrux1@fosstodon.org
2026-01-19

messing around with this tired #dell #tablet to see how useful can it be for "hacking".

I recently revived my blog if you are curious for more details rux.one/2026/01/18/pentesting-

#pentesting #security #linux #intel

2026-01-19

Physical penetration testing highlights a growing overlap between human behavior, AI capabilities, and access control weaknesses.

A seasoned pentester explains how publicly available audio, voice cloning tools, and social engineering can bypass service desks and building security - often without exploiting software vulnerabilities.

The discussion raises an important question for defenders: are awareness programs designed to be memorable and practical, or simply compliant?

Source: cybernews.com/ai-news/physical

Follow TechNadu for continued cybersecurity reporting and practitioner insights.

Engage in the discussion below.

#InfoSec #Pentesting #AIThreats #SocialEngineering #SecurityTraining #PhysicalSecurity #CyberDefense

Physical hacker explains how to break into buildings and why AI is making the job easier
2026-01-19

Endlich ist er da: Mein 𝗪𝗶𝗙𝗶 𝗣𝗶𝗻𝗲𝗮𝗽𝗽𝗹𝗲 𝗣𝗮𝗴𝗲𝗿 📦 ist angekommen! Die neue WLAN und Bluetooth Hackign Hardware.

Ich verfolge die Entwicklung der 𝗛𝗮𝗸𝟱-Tools schon lange und bin extrem gespannt darauf, wie sich der neue Pager im Feld schlägt. Der Formfaktor ist genial – ein bisschen Retro-Vibes gepaart mit moderner Pentesting-Hardware.

In der nächsten Zeit werde ich das Device auf Herz und Nieren prüfen und schauen, wie es sich in mein bestehendes Setup integriert. Besonders bin ich auf den 6GHz gespannt. Natürlich werde ich meine Erfahrungen und ersten Eindrücke sicher bald dokumentieren.

Hat von euch schon jemand den Pager im Einsatz?

#ITSecurity #Pentesting #Hak5 #WiFiPineapple #NetworkSecurity #Gadgets #TechReview #HackingHardware

Simon Roses Femerlingsimonroses@infosec.exchange
2026-01-18

A new bad boy is in town, oh yeah. Lets hack 😉 #hak5 @hak5 #wifi #Bluetooth #pentesting #cybersecurity #HackThePlanet

kriware :verified:kriware@infosec.exchange
2026-01-18

TaskHound – Privileged Scheduled Task Enumerator

Tool that enumerates privileged Windows Scheduled Tasks remotely, analyzes XML/task credentials and integrates with BloodHound for attack path insights.

github.com/1r0BIT/TaskHound

#WindowsAD #pentesting

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst