A Beginner’s Guide to the CVE process

Before I got into the security field full time, I made it my goal to someday discover a previously unpublished […]

Compromise a DCOS Server through a Docker Container

Ever wonder how you can use a docker container to compromise the host? There is a simple process to do so, if […]

Crontab One Time Payload Execution

Recently, I was writing an exploit for a vulnerability that I had discovered in a Linux based server application. The […]

Building a Vulnerable Box – HFS Revisted

A few months ago, in the Building a Vulnerable Box series, I wrote a walkthrough for putting together and compromising […]

Metasploit Module of the Month – web_delivery

In the second edition of this series we are going to take a look at an exploit module that doesn’t […]

MasterLock Combination Lock Vulnerabilty and Exploit

A couple of weeks ago, I came across an article from Samy Kamkar on how to successfully guess a combination for […]