Security Risk Advisors

Category: Red Teams

BSides Philly 2017 - MFA: It's 2017 and You're Still Doing It Wrong

December 13, 2017 | Posted in Red Teams by Chris Salerno

Security Risk Advisors is proud to have been a Platinum Sponsor at BSides Philly on Friday, December 8th. In addition to continued involvement in and support for the BSides organization, Security Risk Advisors' Chris Salerno and Dan Astor also presen… Continue Reading

New Vulnerability, Same Old Tomcat: CVE-2017-12617

October 30, 2017 | Posted in Red Teams by Chris Myers

Tomcat has been a staple target for penetration testers and malicious actors for years. With ample opportunities to exploit security misconfigurations in the management GUI (tomcat:tomcat….) or technical vulnerabilities, it’s no wonder attackers cont… Continue Reading

Peripheral Pwnage: Mousejacking 2.4 Ghz Input Devices

August 31, 2017 | Posted in Red Teams by Jonathan Renard

Hostile Airwaves

On internal engagements, poisoning name resolution requests on the local network (à la Responder) is one of the tried and true methods of obtaining that coveted set of initial Domain credentials.  While this approach has worked on man… Continue Reading

The Macro Evolution: Bypassing Gmail’s Virus Filter and Reliably Establishing C2 Channels with Office Macros

August 10, 2017 | Posted in Red Teams by Barrett Adams


During an email phishing engagement, one of the attacks we typically use is a malicious Microsoft Office macro. For the unfamiliar, macros are bits of code embedded in Office documents. T… Continue Reading

A Smaller, Better JSP Web Shell

July 25, 2017 | Posted in Red Teams by Barrett Adams


In recent external pen tests, we have come across several Apache Struts instances that are vulnerable to a remote code execution (RCE) vulnerability. Our usual procedure for any RCE vulnerability that we are going to exploit is to upload a … Continue Reading