Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Claudius Link boosted
Najam Ul Saqib :verified:
Najam Ul Saqib :verified:
@cybersoldier@infosec.exchange  ·  activity timestamp 2 years ago

These days I am trying to learn AD pentest and many questions are popping up in my mind, so here's one for AD Attackers.
In LLMNR Poisoning, we're setting a server running responder that will listen to LLMNR queries and act as rogue SMB server, but how can we trick users to put some non-existent IP address or share name into their explorer? Are we just relying on a coincidence of a user mistakenly jotting down a typo?

#ActiveDirectory #Pentesting

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 weeks ago

Comparing AI agents to cybersecurity professionals in real-world pen testing

https://arxiv.org/abs/2512.09882

#HackerNews #AIagents #cybersecurity #penTesting #realWorld #comparison

  • Copy link
  • Flag this post
  • Block
Claudius Link boosted
Mike Sheward
Mike Sheward
@SecureOwl@infosec.exchange  ·  activity timestamp 2 weeks ago

I don't usually post work or business related things on here, as it's my outlet for therapeutic shitposting BUT that said, I was reminded yesterday that 2025 marked the 10th year in business for my little venture, Secure Being, an #infosec consultancy focused on issues that impact real people.

I originally set it up with two goals - 1) manage book related things, and 2) as I became more leadershippy™️ in my day job, I wanted to have the opportunity to stay hands-on, and still engage in pen-testing and forensics and all the good stuff I love.

I don't aggressively advertise the company, it's a word of mouth type thing really, I have a regular core of customers at this point, who keep me busy - but of course, always happy to add new ones.

This last year was probably the most fun I've had with it though, I done infosec work for a professional sports arena, a brand new model of jet aircraft and its avionics, and I've had about 6 or so critical findings on various products that have caused me to stop testing, and get immediate fixes in place - as the issues discovered were extremely risky to, not just businesses, but actual human people too - which of course was the main focus.

So yeah, here's to another 10 years! And if you are ever in the market for a pentester, forensicator, or anything else really - give us a look!

Cheers!

https://www.securebeing.com/

#pentesting #DFIR #forensics

  • Copy link
  • Flag this post
  • Block
Mike Sheward
Mike Sheward
@SecureOwl@infosec.exchange  ·  activity timestamp 2 weeks ago

I don't usually post work or business related things on here, as it's my outlet for therapeutic shitposting BUT that said, I was reminded yesterday that 2025 marked the 10th year in business for my little venture, Secure Being, an #infosec consultancy focused on issues that impact real people.

I originally set it up with two goals - 1) manage book related things, and 2) as I became more leadershippy™️ in my day job, I wanted to have the opportunity to stay hands-on, and still engage in pen-testing and forensics and all the good stuff I love.

I don't aggressively advertise the company, it's a word of mouth type thing really, I have a regular core of customers at this point, who keep me busy - but of course, always happy to add new ones.

This last year was probably the most fun I've had with it though, I done infosec work for a professional sports arena, a brand new model of jet aircraft and its avionics, and I've had about 6 or so critical findings on various products that have caused me to stop testing, and get immediate fixes in place - as the issues discovered were extremely risky to, not just businesses, but actual human people too - which of course was the main focus.

So yeah, here's to another 10 years! And if you are ever in the market for a pentester, forensicator, or anything else really - give us a look!

Cheers!

https://www.securebeing.com/

#pentesting #DFIR #forensics

  • Copy link
  • Flag this post
  • Block
Frédéric Jacobs boosted
Konstantin :C_H:
Konstantin :C_H:
@kpwn@infosec.exchange  ·  activity timestamp 3 weeks ago

#CVECrowd, your go-to place for #CVE discussions on the Fediverse and Bluesky, now supports email alerts.

https://cvecrowd.com

Here's how it works:

- You define one or more alert keywords
- Keywords are matched against vendor, product, and package names from official CVE data
- If a post mentions a CVE that matches one of your keywords, you receive an email notification

Read more below 🧵

#Pentesting #AppSec #InfoSec #CyberSecurity #BugBounty #Hacking

  • Copy link
  • Flag this post
  • Block
Konstantin :C_H:
Konstantin :C_H:
@kpwn@infosec.exchange  ·  activity timestamp 3 weeks ago

#CVECrowd, your go-to place for #CVE discussions on the Fediverse and Bluesky, now supports email alerts.

https://cvecrowd.com

Here's how it works:

- You define one or more alert keywords
- Keywords are matched against vendor, product, and package names from official CVE data
- If a post mentions a CVE that matches one of your keywords, you receive an email notification

Read more below 🧵

#Pentesting #AppSec #InfoSec #CyberSecurity #BugBounty #Hacking

  • Copy link
  • Flag this post
  • Block
Bill
Bill
@Sempf@infosec.exchange  ·  activity timestamp 2 months ago

What cool shit can I add to a response header if I found poisoning? Aside from the boring "send in a whole new page?"

#appsec #pentesting

  • Copy link
  • Flag this post
  • Block
OrangeCon
OrangeCon
@orangecon@infosec.exchange  ·  activity timestamp 7 months ago

Watch Brenno De Winter’s talk from OrangeCon 2024 on making penetration tests auditable again.
Watch here: https://www.youtube.com/watch?v=Rv0otVFKrkk
#OrangeCon2024#Pentesting#Cybersecurity#Infosec

  • Copy link
  • Flag this post
  • Block
Biohacking Village
Biohacking Village
@biohacking_village@mastodon.social  ·  activity timestamp 7 months ago

DEF CON Training 2025
📅 August 9–12, 2025 | 4-Day Training

Join Michael Aguilar #v3ga and Alex Delifer #Cheet for a hands-on course on Medical Device Penetration Testing at #DEFCON33 @defcon

Learn more and sign up: https://training.defcon.org/collections/def-con-training-las-vegas-2025/products/michael-aguilar-v3ga-alex-delifer-cheet-medical-device-penetration-testing-dctlv2025-4-day-training

#Biohackingvillage#PenTesting#Cybersecurity #hackers#Hacking #workshop#DEFCON

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.35 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct