AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Abstract cybersecurity illustration featuring servers, network nodes, and stylized attack indicators representing penetration testing and threat activity.

Offensive
Security Blog

Expert insights on offensive security, AI vulnerabilities, and emerging threats from Bishop Fox's leading security researchers and penetration testers.

Technical Research

GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath

GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath

Feb 17, 2020

GadgetProbe is a tool to probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on a remote Java classpath.

By Jake Miller

Technical Research

How to Set Up Zniffer for Z-Wave

How to Set Up Zniffer for Z-Wave

Feb 12, 2020

Bishop Fox helps hardware security testers with a detailed step-by-step process for setting up a Z-Wave Zniffer, a wireless communications protocol.

By Priyank Nigam

Industry

How to Prevent the OWASP Top 10

How to Prevent the OWASP Top 10

Feb 10, 2020

Bishop Fox highlights how to prevent the OWASP top 10, the most common high risk vulnerabilities such as sensitive data exposure and cross-site scripting.

By Britt Kemp

Technical Research

Dufflebag: Uncovering Secrets in Exposed EBS Volumes

Dufflebag: Uncovering Secrets in Exposed EBS Volumes

Feb 3, 2020

Dufflebag is an open source tool that allows users to quickly look through public Amazon EBS volumes for snapshots of references to their organizations.

By Dan Petro

Industry

Identifying the Modern Attack Surface

Identifying the Modern Attack Surface

Jan 28, 2020

For the new Bishop Fox Inside Engineering series, Brad Sickles shares how his team used the frameworks they built to define the modern attack surface.

By Brad Sickles

Advisory

ConnectWise Control 19.3.25270.7185 - Eight Vulnerabilities, Including Critical

ConnectWise Control 19.3.25270.7185 - Eight Vulnerabilities, Including Critical

Jan 22, 2020

This advisory from the Bishop Fox research team highlights eight vulnerabilities, including critical, in the ConnectWise Control application, version 19.3.25270.7185.

By Daniel Wood

Culture

Return to NetWars: Tournament of Champions

Return to NetWars: Tournament of Champions

Jan 21, 2020

By Barrett Darnell

Industry

7 of the Most Memorable CVEs of 2019

7 of the Most Memorable CVEs of 2019

Dec 30, 2019

As we end this year, we’re taking a look back at some of the vulnerabilities that made headlines, scared us a little bit, and stirred us to apply patches.

By Britt Kemp

Advisory

Big Monitoring Fabric Application

Big Monitoring Fabric Application

Dec 30, 2019

High-risk vulnerabilities in the Big Monitoring Fabric app that would grant a remote attacker admin access and SSH console access to the affected system.

By Chris Davis

Advisory

Dradis Pro Version 3.4.1

Dradis Pro Version 3.4.1

Dec 30, 2019

Dradis Pro app was affected by an insecure direct object reference vulnerability allowing a user to extract project content and disclose information.

By Florian Nivette

Technical Research

Escalator to the Cloud: 5 Privesc Attack Vectors in AWS

Escalator to the Cloud: 5 Privesc Attack Vectors in AWS

Dec 19, 2019

Identify what to look out for to mitigate or remove AWS privilege escalation. Gerben Kleijn sorted the 21 methods across AWS services in five categories.

By Gerben Kleijn

Technical Research

Well, That Escalated Quickly: Privilege Escalation in AWS

Well, That Escalated Quickly: Privilege Escalation in AWS

Dec 19, 2019

For security professionals performing AWS cloud security reviews or pen tests. Explore methods that can be used in practice and explained clearly to clients.

By Gerben Kleijn

Technical Research

CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI

CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI

Dec 12, 2019

Telerik UI for ASP.NET AJAX insecurely deserializes JSON objects resulting in arbitrary RCE. Learn how to patch and securely configure this software.

By Caleb Gross

Technical Research

SFDC Secure Development Cheat Sheet

SFDC Secure Development Cheat Sheet

Dec 11, 2019

This guide helps developers build secure Salesforce web applications, whether the goal is to pass the AppExchange review or improve an application’s security.

By Zach Julian

Advisory

Solismed Version 3.3SP1

Solismed Version 3.3SP1

Dec 9, 2019

Bishop Fox's Chris Davis discovered several vulnerabilities in the Solismed application version 3.3SP1, which you can read about in this advisory.

By Chris Davis

Industry

The Pen Testing Tools We’re Thankful for This Season

The Pen Testing Tools We’re Thankful for This Season

Nov 28, 2019

Recap of Bishop Fox's penetration testing tools for 2019.

By Britt Kemp

Technical Research

Reasonably Secure Electron

Reasonably Secure Electron

Nov 21, 2019

Many still consider the Electron framework insecure. This research describes how to effectively design applications that defend against attacks.

By Joe DeMesy

Industry

Scary Security Stories to Tell in the Dark

Scary Security Stories to Tell in the Dark

Oct 31, 2019

Three scary cybersecurity stories for Halloween: hacking mass transit, deepfakes and smart homes.

By Britt Kemp

Technical Research

Glossary of Relevant AWS Terms

Glossary of Relevant AWS Terms

Oct 28, 2019

All entry text is from the AWS Glossary Version 1.0.

By Gerben Kleijn

Industry

Introducing cyber.dic

Introducing cyber.dic

Sep 30, 2019

Cyber.dic is a tool for security professionals who find that everyday technical terms are underlined in red in their emails, reports, and presentations.

By Brianne Hughes, Catherine Lu

Technical Research

Breaching the Trusted Perimeter | Automating Exploitation

Breaching the Trusted Perimeter | Automating Exploitation

Sep 12, 2019

Automating Exploitation of a Pulse SSL VPN Arbitrary File Read Vulnerability

By Jon Williams

Industry

OpenEMR 5.0.1(6) - Technical Advisory Release

OpenEMR 5.0.1(6) - Technical Advisory Release

Sep 11, 2019

Bishop Fox researcher Chris Davis identified high and medium-risk security issues in a popular open source healthcare. This blog post provides an overview of those findings.

By Chris Davis

Advisory

OpenEMR 5.0.1(6) - RCE and XSS

OpenEMR 5.0.1(6) - RCE and XSS

Sep 10, 2019

Bishop Fox researcher Chris Davis discovered a high-risk vulnerability in OpenEMR, an open source healthcare software application.

By Chris Davis

Industry

Cybersecurity Fatalism - How It Poisons Your Decision Making

Cybersecurity Fatalism - How It Poisons Your Decision Making

Sep 2, 2019

Cybersecurity fatalism is a tempting mindset to fall into, but it's not a healthy one - or, as Bishop Fox researcher Dan Petro says, "it's bad and wrong".

By Dan Petro

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.