CODE WHITE - FINEST HACKING
Intelligence Driven Security
Initial Assessment
Security Intelligence Service
About us
PUBLIC VULNERABILITY LIST
Unauthenticated Remote Code Execution via Deserialization of Untrusted Data in mediDOK
Multiple Vulnerabilities in GFI MailEssentials
Unauthenticated ServerSide TemplateInjection in Metazo
...
CAREERS
Challenge
Senior Red Teamer
Senior Penetration Tester
Vulnerability Intelligence Analyst
BLOG
Analyzing the Attack Surface of Ivanti's DSM
Teaching the Old .NET Remoting New Exploitation Tricks
Leaking ObjRefs to Exploit HTTP .NET Remoting
...
>
CODE WHITE | Red Teaming & Attack Surface Management
>
Tags
>
Exploitation Technique
Analyzing the Attack Surface of Ivanti's DSM
Teaching the Old .NET Remoting New Exploitation Tricks
Exploiting ASP.NET TemplateParser — Part II: SharePoint (CVE-2023-33160)
Exploiting ASP.NET TemplateParser — Part I: Sitecore (CVE-2023-35813)
From Blackbox .NET Remoting to Unauthenticated Remote Code Execution
Java Exploitation Restrictions in Modern JDK Times
Bypassing .NET Serialization Binders
.NET Remoting Revisited
CVE-2019-19470: Rumble in the Pipe
Exploiting H2 Database with native libraries and JNI
Telerik Revisited
AMF – Another Malicious Format
Return of the Rhino: An old gadget revisited
Reading/Writing files with MSSQL's OPENROWSET
$@|sh – Or: Getting a shell environment from Runtime.exec