Foregenix-Logo-Horizontal-Colour
Free Webscan

Cybersecurity Insights

Kieran Murphy

Foregenix’s Global Penetration Testing Practice Achieves CREST Accreditation

08/10/20 11:22

MARLBOROUGH, UK -- Foregenix, a top cybersecurity player in the Payments and Banking industry, is proud to be recognised as a CREST accredited organisation in the Penetration Testing space. As a not-for-profit accreditation body, CREST provides a world-renowned standard for penetration testing, vulnerability assessments, cyber incident response, and more.

Read More
Kieran Murphy

Amazon GuardDuty Security Review

02/09/20 09:15

Recently, Foregenix worked with Amazon Web Services to do a security review of the GuardDuty Intelligent Threat Detection Service. Specifically, we were looking for three abilities in the service:

Read More
Zacharias Pigadas

Using DNS as an out-of-band command output retrieval channel

04/06/20 10:02

 

Setting the scene

A fair amount of the work we do in the Foregenix Penetration Testing team is, in one way or another, a flavour of web application penetration testing. In these assessments we come across command execution vulnerabilities that belong in one of two different categories:

  1. Those were the output is returned directly to the user and,
  2. Well… those that are not.

In this blog post we will discuss the latter, cases where the output of our command is not directly displayed on the application, and present a strategy for obtaining access to the output of our command using recursive DNS queries. Finally we construct a practical example of the discussed strategy via a step by step process bypassing different constraints imposed to us by the use of DNS as an out of band retrieval method.

Read More
Alex Constantinou

Detection Lab for Pentesters

15/04/20 10:00

Detection Lab, designed and maintained by Chris Long, is a collection of Vagrant and Packer scripts. These scripts allow users to quickly spin up a fully configured and monitored Windows Active Directory environment. Once the setup is complete, we will have a fully functional lab designed with defenders and security researchers in mind. Detection Lab can easily be modified to fit most needs or expanded to include additional hosts.  This blog will demonstrate how to install and use Detection Lab with penetration testers in mind.

Read More
Giuliano Fasto

Introducing RETURNINGPATIENT

09/04/20 10:00

In our previous post, Red Teaming: Command and Control protocols, we performed a very brief introduction of RETURNINGPATIENT in the general context of choosing different command and control strategies in our red teaming campaigns. In this post, we will take a deeper dive into RETURNINGPATIENT itself and discuss its properties and its limitations.

Read More
Kieran Murphy

Foregenix’s Global Penetration Testing Practice Achieves CREST Accreditation

08/10/20 11:22

MARLBOROUGH, UK -- Foregenix, a top cybersecurity player in the Payments and Banking industry, is proud to be recognised as a CREST accredited organisation in the Penetration Testing space. As a not-for-profit accreditation body, CREST provides a world-renowned standard for penetration testing, vulnerability assessments, cyber incident response, and more.

Read More
Kieran Murphy

Amazon GuardDuty Security Review

02/09/20 09:15

Recently, Foregenix worked with Amazon Web Services to do a security review of the GuardDuty Intelligent Threat Detection Service. Specifically, we were looking for three abilities in the service:

Read More
Zacharias Pigadas

Using DNS as an out-of-band command output retrieval channel

04/06/20 10:02

 

Setting the scene

A fair amount of the work we do in the Foregenix Penetration Testing team is, in one way or another, a flavour of web application penetration testing. In these assessments we come across command execution vulnerabilities that belong in one of two different categories:

  1. Those were the output is returned directly to the user and,
  2. Well… those that are not.

In this blog post we will discuss the latter, cases where the output of our command is not directly displayed on the application, and present a strategy for obtaining access to the output of our command using recursive DNS queries. Finally we construct a practical example of the discussed strategy via a step by step process bypassing different constraints imposed to us by the use of DNS as an out of band retrieval method.

Read More
Alex Constantinou

Detection Lab for Pentesters

15/04/20 10:00

Detection Lab, designed and maintained by Chris Long, is a collection of Vagrant and Packer scripts. These scripts allow users to quickly spin up a fully configured and monitored Windows Active Directory environment. Once the setup is complete, we will have a fully functional lab designed with defenders and security researchers in mind. Detection Lab can easily be modified to fit most needs or expanded to include additional hosts.  This blog will demonstrate how to install and use Detection Lab with penetration testers in mind.

Read More
Giuliano Fasto

Introducing RETURNINGPATIENT

09/04/20 10:00

In our previous post, Red Teaming: Command and Control protocols, we performed a very brief introduction of RETURNINGPATIENT in the general context of choosing different command and control strategies in our red teaming campaigns. In this post, we will take a deeper dive into RETURNINGPATIENT itself and discuss its properties and its limitations.

Read More