AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Technical Research

Technical Research

Stand Your Cloud #3: AWS Provisioning and Access Requests

Stand Your Cloud #3: AWS Provisioning and Access Requests

Nov 14, 2017

AWS security can often be achieved thanks to proper provisioning + access requests. In this write-up, Gerben Kleijn explores how to handle these processes.

By Gerben Kleijn

Technical Research

A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client

A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client

Oct 10, 2017

A bug has no name - multiple heap buffer overflows in windows dns client - CVE-2017-11779 was fixed by Microsoft in October of 2017. This bug was discovered by Bishop Fox's consultant, Nick Freeman.

By Nick Freeman

Technical Research

Is CORS Becoming Obsolete?

Is CORS Becoming Obsolete?

Sep 6, 2017

CORS is not obsolete as feared - but rather, it's become part of a larger standard known as FETCH.

By Tim Sapio

Technical Research

Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data

Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data

Aug 28, 2017

Sarahah, the chat app marketed as being "anonymous," has a disturbing secret - a Sarahah leak may endanger the contact info of possibly millions of users.

By Zach Julian

Technical Research

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

Aug 3, 2017

Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products

By Francis Brown

Technical Research

How I Built An XSS Worm On Atmail

How I Built An XSS Worm On Atmail

Jun 23, 2017

Read an account of creating an XSS worm on a popular email hosting service provider.

By Zach Julian

Technical Research

How We Can Stop Email Spoofing

How We Can Stop Email Spoofing

May 23, 2017

Email spoofing is an antiquated attack that 98 percent of the internet is vulnerable to - even in the modern age. Defend yourself with our tool, SpoofCheck.

By Alex DeFreese

Technical Research

The CIA Leak: A Look On the Bright Side...

The CIA Leak: A Look On the Bright Side...

Mar 8, 2017

A closer examination of the CIA Leak: Don’t get lost in the hype. There is a bright side to strife...

By Dan Petro

Technical Research

In the News: A BGP Hijacking Technical Post-Mortem

In the News: A BGP Hijacking Technical Post-Mortem

Jan 18, 2017

BGP hijacking was utilized by the Iranian government in early January 2016. In this microblog, Zach Julian analyzes the technical implications of the event.

By Zach Julian

Technical Research

A Guide to Do-It-Yourself Network Segmentation

A Guide to Do-It-Yourself Network Segmentation

Nov 30, 2016

Want to keep your network secure? Working with a shoestring budget? Check out our do-it-yourself network segmentation guide.

By Cory Johnson

Technical Research

Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

Aug 10, 2016

Bishop Fox's Dan Petro explains the creation of his SmashBot AI character and how he implemented time-honored hacker techniques in the development process.

By Dan Petro

Technical Research

If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data

If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data

Apr 8, 2016

CVE-2016-1764, fixed by Apple in March of 2016, is an application-layer bug that leads to the remote disclosure of all message content and attachments in plaintext by exploiting the OS X Messages clie

By Joe DeMesy, Shubham Shah, and Matthew Bryant

Technical Research

Burp, Collaborate, and Listen: A Pentester Reviews the Latest Burp Suite Addition

Burp, Collaborate, and Listen: A Pentester Reviews the Latest Burp Suite Addition

Feb 3, 2016

Bishop Fox pentesters analyze the implications and benefits of Burp Suite's newest penetration testing feature, Collaborator. Read our take at our blog.

By Max Zinkus

Technical Research

Fishing the AWS IP Pool for Dangling Domains

Fishing the AWS IP Pool for Dangling Domains

Oct 7, 2015

Matt Bryant goes IP fishing in the AWS pool. Read about how he did it - and why expired digital assets can pose a threat.

By Matt Bryant

Technical Research

Stand Your Cloud #2: Host Server Hardening

Stand Your Cloud #2: Host Server Hardening

Sep 23, 2015

In the second part of this AWS security series, Ruihai Fang and Trevor Lawrence share some best practices for strengthening your infrastructure.

By Trevor Lawrence & Ruihai Fang

Technical Research

The Active Directory Kill Chain: Is Your Company at Risk?

The Active Directory Kill Chain: Is Your Company at Risk?

Sep 8, 2015

Bishop Fox's Kevin Sugihara walks through a step-by-step exploit on the Active Directory service offered by Microsoft.

By Kevin Sugihara

Technical Research

ColdFusion Bomb: A Chain Reaction From XSS to RCE

ColdFusion Bomb: A Chain Reaction From XSS to RCE

Aug 27, 2015

Shubham Shah discovered a vulnerability in the ColdFusion application. The Bishop Fox blog explains the vuln's details as well as how Adobe fixed the issue.

By Shubham Shah

Technical Research

An Overview of BGP Hijacking

An Overview of BGP Hijacking

Aug 17, 2015

At the Bishop Fox blog, Zach Julian discusses the intricacies and threats of BGP hijacking. His post serves as an introduction to the subject matter.

By Zach Julian

Technical Research

On the "Brink" of a Robbery

On the

Jul 28, 2015

Bishop Fox's Dan Petro explains vulnerabilities found in the Brink's CompuSafe Galileo and how they can lead to smart safe hacking in this blog post.

By Dan Petro

Technical Research

Rethinking & Repackaging iOS Apps: Part 2

Rethinking & Repackaging iOS Apps: Part 2

May 4, 2015

In Part 2, Carl Livitt introduces a toolchain for enabling iOS application hacking tools on non-jailbroken devices and includes a step-by-step guide.

By Carl Livitt

Technical Research

Vulnerable by Design: Understanding Server-Side Request Forgery

Vulnerable by Design: Understanding Server-Side Request Forgery

Apr 18, 2015

Learn the basics of server-side request forgery vulnerabilities - and how to protect against them - in this blog post by Mike Brooks.

By Mike Brooks

Technical Research

Rethinking & Repackaging iOS Apps: Part 1

Rethinking & Repackaging iOS Apps: Part 1

Feb 24, 2015

Learn how to modify App Store apps on jailed iOS devices. We'll show you how in this two-part series, complete with code and more.

By Carl Livitt

Technical Research

Tastic RFID Thief: Silent, But Deadly

Tastic RFID Thief: Silent, But Deadly

Sep 24, 2014

Silence your Tastic RFID Thief; our blog post shows how you can avoid the loud beep when turning on the RFID hacking tool during your next physical pentest.

By Francis Brown

Technical Research

SearchDiggity: Avoid Bot Detection Issues by Leveraging Google, Bing, and Shodan APIs

SearchDiggity: Avoid Bot Detection Issues by Leveraging Google, Bing, and Shodan APIs

Aug 29, 2014

Google Hacking with SearchDiggity. Leveraging the official APIs of Google, Bing, and SHODAN to avoid bot detection while performing automated scans.

By Francis Brown

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.