
Scorpion Labs
@scorpion_labs
Followers
25
Following
0
Media
0
Statuses
7
@klogix's Offensive Security Team
Joined February 2023
Take a look at our latest blog post where David E. Baker will take you through the reverse engineering process from understanding calling conventions to working around a lack of symbols. We also wrap up with some fun cheating at Minesweeper.
klogixsecurity.com
Blog post describing reverse engineering techniques including a review of calling conventions, and what to do if your binary doesn't have symbols.
0
1
1
After taking @steventseeley 's Full Stack Web Attack - Java course, I understood deserialization and gadget chains in Java. Highly recommend his training!.
0
0
0
Java deserialization can lead to security risks. Read about gadget chains and remote code execution: #Java #Security.
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
1
1
Sometimes, exploits don't work out of the box and must be updated. In this latest blog post, David Baker, a Senior Security Consultant with Scorpion Labs discusses how he approached fixing an exploit to make it work with a different hardware.
klogixsecurity.com
we go over a few techniques for porting exploits across firmware versions with regards to updating addresses to cover the updated memory locations
0
2
1
Credential reuse is still a popular "exploit" to leverage during penetration tests. In our latest blog post, David Lane outlines three case studies where password reuse led to devastating results in recent penetration tests.
klogixsecurity.com
A selection of hand-picked case-studies demonstrating the real-world impact of password reuse.
0
1
2
Sometimes the little things can have a big impact. In our latest blog post @JakeWnuk retells a story from a recent security assessment where vulnerabilities were chained together to escalate privileges from an anonymous user to a cloud administrator.
klogixsecurity.com
Following the journey of a web application penetration test where vulnerabilities were chained to maximize impact for a cloud hosted application.
0
2
0
Our inaugural blog post is here! Come along with one of our Senior Consultants, David Baker, and learn about finding 0-days in routers and the journey that is vulnerability research.
klogixsecurity.com
A journey through embedded device exploitation, from hands-on-the-device to complete remote takeover.
0
5
5