scorpion_labs Profile Banner
Scorpion Labs Profile
Scorpion Labs

@scorpion_labs

Followers
25
Following
0
Media
0
Statuses
7

@klogix's Offensive Security Team

Joined February 2023
Don't wanna be here? Send us removal request.
@scorpion_labs
Scorpion Labs
5 months
Take a look at our latest blog post where David E. Baker will take you through the reverse engineering process from understanding calling conventions to working around a lack of symbols. We also wrap up with some fun cheating at Minesweeper.
Tweet card summary image
klogixsecurity.com
Blog post describing reverse engineering techniques including a review of calling conventions, and what to do if your binary doesn't have symbols.
0
1
1
@scorpion_labs
Scorpion Labs
1 year
After taking @steventseeley 's Full Stack Web Attack - Java course, I understood deserialization and gadget chains in Java. Highly recommend his training!.
@scorpion_labs
Scorpion Labs
1 year
Java deserialization can lead to security risks. Read about gadget chains and remote code execution: #Java #Security.
0
0
0
@scorpion_labs
Scorpion Labs
1 year
Java deserialization can lead to security risks. Read about gadget chains and remote code execution: #Java #Security.
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
1
1
@scorpion_labs
Scorpion Labs
2 years
Sometimes, exploits don't work out of the box and must be updated. In this latest blog post, David Baker, a Senior Security Consultant with Scorpion Labs discusses how he approached fixing an exploit to make it work with a different hardware.
Tweet card summary image
klogixsecurity.com
we go over a few techniques for porting exploits across firmware versions with regards to updating addresses to cover the updated memory locations
0
2
1
@scorpion_labs
Scorpion Labs
2 years
Credential reuse is still a popular "exploit" to leverage during penetration tests. In our latest blog post, David Lane outlines three case studies where password reuse led to devastating results in recent penetration tests.
Tweet card summary image
klogixsecurity.com
A selection of hand-picked case-studies demonstrating the real-world impact of password reuse.
0
1
2
@scorpion_labs
Scorpion Labs
2 years
Sometimes the little things can have a big impact. In our latest blog post @JakeWnuk retells a story from a recent security assessment where vulnerabilities were chained together to escalate privileges from an anonymous user to a cloud administrator.
Tweet card summary image
klogixsecurity.com
Following the journey of a web application penetration test where vulnerabilities were chained to maximize impact for a cloud hosted application.
0
2
0
@scorpion_labs
Scorpion Labs
2 years
Our inaugural blog post is here! Come along with one of our Senior Consultants, David Baker, and learn about finding 0-days in routers and the journey that is vulnerability research.
Tweet card summary image
klogixsecurity.com
A journey through embedded device exploitation, from hands-on-the-device to complete remote takeover.
0
5
5