Tags offensive securityUse proactive security strategies to prevent vulnerabilities in your systems and follow actionable tips from infosec pros. What the experts say: Machine learning in offensive securityIn this third installment, we stop talking and start listening. We asked seasoned offensive security professionals how they actually use machine learning in the field. Their verdict? ML works, when it’s focused. From spotting phishing entry points to flagging suspicious authentication patterns, the value is real. But it’s not magic. Used blindly, it adds noise. Used wisely, it accelerates analysts.Author(s)Alice TeodorescuPublished at26 Jun 2025Updated at16 Jul 2025How to extract TLS secrets from Android apps using Frida and WiresharkBreak Android's TLS fortress! Frida & Wireshark reveal hidden app secrets. Bypass SSL pinning, expose API calls, and master traffic decryption now.Author(s)David BorsPublished at14 Mar 2025Updated at14 Mar 2025Unpacking LDAPNightmare (CVE-2024-49113 and CVE-2024-49112)Uncover the secrets of LDAPNightmare - crash domain controllers, exploit AD weaknesses, and sharpen your pentesting skillsAuthor(s)David Bors,Catalin Iovita,Iulian TitaPublished at28 Jan 2025Updated at28 Jan 2025Roundcube: exfiltrating emails with CVE-2021-44026Have you ever asked yourself: what is the half-life of a disclosed vulnerability? When should we stop worrying about it?Author(s)Catalin Iovita,Robert Ismana,Alexandru PostolachePublished at22 Dec 2023Updated at22 Dec 202317 Infosec pros talk about the future of penetration testingAs offensive security specialists, we want to understand how pentesting changes over the next decade so we can use our experience and know-how to make better decisions.Author(s)Ioana RijnetuPublished at25 Nov 2022Updated at27 Mar 2025Visualize exploit paths with the Sniper network graphWhether working in offensive or defensive security, we all see it: high-risk, widespread vulnerabilities cause significant disruptions to already struggling security teams.Author(s)Andra ZahariaPublished at23 Jun 2022Updated at24 May 2024How to detect VMware vCenter RCE with Pentest-Tools.com (CVE-2021-21972)The current, multi-layer setup big organizations run on is a challenge to manage and we both know that (it’s an understatement). And when a vulnerability like CVE-2021-21972 pops up, it reveals how messy the process of patching and mitigation can be.Author(s)Daniel BecheneaPublished at19 Apr 2021Updated at24 Mar 2023Discover how dangerous a ‘Bad Neighbor’ can be - TCP/IP Vulnerability (CVE-2020-16898)Patching is never easy, but doing it imperfectly can come back to bite you. That’s why today we’re unpacking a vulnerability that can resurface when improperly mitigated.Author(s)Cristian CorneaPublished at03 Nov 2020Updated at18 Jul 2023
What the experts say: Machine learning in offensive securityIn this third installment, we stop talking and start listening. We asked seasoned offensive security professionals how they actually use machine learning in the field. Their verdict? ML works, when it’s focused. From spotting phishing entry points to flagging suspicious authentication patterns, the value is real. But it’s not magic. Used blindly, it adds noise. Used wisely, it accelerates analysts.Author(s)Alice TeodorescuPublished at26 Jun 2025Updated at16 Jul 2025
How to extract TLS secrets from Android apps using Frida and WiresharkBreak Android's TLS fortress! Frida & Wireshark reveal hidden app secrets. Bypass SSL pinning, expose API calls, and master traffic decryption now.Author(s)David BorsPublished at14 Mar 2025Updated at14 Mar 2025
Unpacking LDAPNightmare (CVE-2024-49113 and CVE-2024-49112)Uncover the secrets of LDAPNightmare - crash domain controllers, exploit AD weaknesses, and sharpen your pentesting skillsAuthor(s)David Bors,Catalin Iovita,Iulian TitaPublished at28 Jan 2025Updated at28 Jan 2025
Roundcube: exfiltrating emails with CVE-2021-44026Have you ever asked yourself: what is the half-life of a disclosed vulnerability? When should we stop worrying about it?Author(s)Catalin Iovita,Robert Ismana,Alexandru PostolachePublished at22 Dec 2023Updated at22 Dec 2023
17 Infosec pros talk about the future of penetration testingAs offensive security specialists, we want to understand how pentesting changes over the next decade so we can use our experience and know-how to make better decisions.Author(s)Ioana RijnetuPublished at25 Nov 2022Updated at27 Mar 2025
Visualize exploit paths with the Sniper network graphWhether working in offensive or defensive security, we all see it: high-risk, widespread vulnerabilities cause significant disruptions to already struggling security teams.Author(s)Andra ZahariaPublished at23 Jun 2022Updated at24 May 2024
How to detect VMware vCenter RCE with Pentest-Tools.com (CVE-2021-21972)The current, multi-layer setup big organizations run on is a challenge to manage and we both know that (it’s an understatement). And when a vulnerability like CVE-2021-21972 pops up, it reveals how messy the process of patching and mitigation can be.Author(s)Daniel BecheneaPublished at19 Apr 2021Updated at24 Mar 2023
Discover how dangerous a ‘Bad Neighbor’ can be - TCP/IP Vulnerability (CVE-2020-16898)Patching is never easy, but doing it imperfectly can come back to bite you. That’s why today we’re unpacking a vulnerability that can resurface when improperly mitigated.Author(s)Cristian CorneaPublished at03 Nov 2020Updated at18 Jul 2023