Security Risk Advisors

Blog

BSides Philly 2017 - Threat Hunting: Defining the Process While Circumventing Corporate Obstacles

December 26, 2017 | Posted in Blue Teams by Kevin Foster, Matt Schneck, Ryan Andress

Security Risk Advisors is proud to have been a Platinum Sponsor at BSides Philly on Friday, December 8th. In addition to continued involvement in and support for the BSides organization, Security Risk Advisors' Kevin Foster, Matt Schneck and Ryan And… Continue Reading

Security Risk Advisors is proud to have been a Platinum Sponsor at BSides Philly on Friday, December 8th. In addition to continued involvement in and support for the BSides organization, Security Risk Advisors' Chris Salerno and Dan Astor also presen… Continue Reading

New Vulnerability, Same Old Tomcat: CVE-2017-12617

October 30, 2017 | Posted in Red Teams by Chris Myers, Barrett Adams

Tomcat has been a staple target for penetration testers and malicious actors for years. With ample opportunities to exploit security misconfigurations in the management GUI (tomcat:tomcat….) or technical vulnerabilities, it’s no wonder attackers cont… Continue Reading

Peripheral Pwnage: Mousejacking 2.4 Ghz Input Devices

August 31, 2017 | Posted in Red Teams by Jonathan Renard

Hostile Airwaves

On internal engagements, poisoning name resolution requests on the local network (à la Responder) is one of the tried and true methods of obtaining that coveted set of initial Domain credentials.  While this approach has worked on man… Continue Reading

Background

During an email phishing engagement, one of the attacks we typically use is a malicious Microsoft Office macro. For the unfamiliar, macros are bits of code embedded in Office documents. T… Continue Reading