Social-Engineer Toolkit (SET) v7.7 “Blackout” Released

July 11, 2017 | By:

TrustedSec is proud to announce a major release of the Social-Engineer Toolkit (SET) v7.7. This version incorporates support for hostnames in the HTA attack vector, and a redesigned Java Applet attack vector. Java is still widely used in corporations and with a valid code signing certificate can be one of the easiest ways to get…


Equation Group Dump Analysis and Full RCE on Win7 on MS17-010 with Cobalt Strike

April 15, 2017 | By:

UPDATE: When posting this blog, we had not done the most recent patches for patch Tuesday (in March). This SMB flaw apparently was fixed on Tuesday with MS17-010. When we did our testing, we were out of the patch cycle for March. Clarified the blog post with the update and link to Microsoft below. Link…


A Foundation Built on People – The TrustedSec Family Grows

April 04, 2017 | By:

When I started TrustedSec over five years ago, I had a dream to start a company that makes the security industry better. A company that brings in top talent and amazing people that I call friends. A place where we always work with the mindset of “always doing the right thing” for our people and…


Classy Inter-Domain Routing Enumeration

March 17, 2017 | By:

During the information gathering phase of a penetration test, we want to discover the netblocks, or ranges, owned by the target organization. This allows us to produce a list of potential hosts for further enumeration. For very large organizations, or ones that have been around since the birth of the Internet, it is possible that…


Full Disclosure: Adobe ColdFusion Path Traversal for CVE-2010-2861

March 15, 2017 | By:

This blog was written by Scott White, Senior Principal Security Consultant, Web Application Team Lead – TrustedSec TL;DR: A publicly undisclosed pre-auth local file disclosure path in older Adobe ColdFusion products (8.0, 8.0.1, 9.0, 9.0.1 and earlier versions) exists at /CFIDE/debug/cf_debugFr.cfm?userPage=../../etc/hosts During a recent penetration test, a web site utilizing cfm pages was identified and…


Office 365 – Advanced Threat Protection (ATP): Features and Shortfalls

February 13, 2017 | By:

Office 365 has an assortment of capabilities allowing both small to extremely large businesses to move their infrastructure and services to the cloud. In 2015, Microsoft introduced their “Advanced Threat Protection” functionality and has since been bolstered in 2016 and 2017 as a direct way to protect against advanced attacks. If you look at Microsoft’s…


Circumventing EncodedCommand and IEX Detection in PowerShell

January 25, 2017 | By:

PowerShell continues to be one of the hot topics for security conferences and something that is actively being used both for offense and for defense. Defenders are getting smarter when it comes to detecting potentially malicious uses of PowerShell through a number of methods. There’s a number of methods that are used for legitimate and…


Wire Messenger – A new competitor to Signal and more?

December 24, 2016 | By:

It’s still too soon to tell, but do we finally have an alternative to Signal? I see a lot of folks asking about Wire Messenger. A lot of the same questions and I thought I would help on answering some of these questions. #1 Why is everyone switching and why should I when we have…


Damaging INFOSEC Credibility: News Articles and Researchers Overhyping Security Threats

December 13, 2016 | By:

Watching the election cycle has brought some interesting perspective to the term “fake news” and what the term really means. We struggle from a lot of the same issues in the security industry and unfortunately, for most of the average users, they cannot differentiate on whats real or not. The news wants to sensationalize things…


ISC2 Board of Directors – Members: This is a post you should read.

August 23, 2016 | By:

I understand that this post is long-winded and probably TLDR for some. If you are an ISC2 certificate holder or was one in the past, I would encourage you to read this as it hopefully has a lot of insight into how the organization runs. This is my first year being on the board of…