Weaponization of Nessus Plugins

Posted by Faisal Tameesh on February 06, 2018Link 

Des Pic

Overview During a recent internal penetration test, the need arose to exploit a Java two-stage deserialization vulnerability. This post will walk through how to twist a Nessus plugin, meant to test only for the existence of an RCE vulnerability, into a weaponized exploit that can be utilized to attain a reverse shell on your own attacking server. This was necessary...Continue reading 

Exploiting Custom Template Engines

Posted by Dalton Campbell on January 25, 2018Link 

Introduction When performing an application assessment one of the areas within an app I pay particular attention to is any ability to define custom templates. By this I mean functionality that extends the ability to generate custom, dynamic, report, email, and document structures to application users. This functionality can often be exploited because of how dynamic these functions are required...Continue reading 

Indicators of Poor Assessment Work

Posted by Jake Reynolds on January 08, 2018Link 

In the 11+ years Depth has been in business we've had the opportunity to see some less than stellar work as far as assessment services go. Our clients often send us assessment reports they've received from other security firms. Sometimes they want us to check remediation status on a single item. Other times they aren't sure whether a given vulnerability is...Continue reading 

Have Questions?
Get Answers