ptonewreckin (25)in #security • 6 years ago • NoneRevenge of the Sticky Keys - An Exercise In Privilege Escalation and PersistenceA while back I was messing with the Pupy framework and decided to write a fun module for persistence/privilege…ptonewreckin (25)in #security • 6 years ago • NoneDirect Object References - What are they and how can we stop them!!?During an interview a few years back I was asked, "If you had the power to remove any application-related…ptonewreckin (25)in #security • 6 years ago • NoneGymnastics with SSHLet's say you travel a lot or are on vacation in Greece. Is Greece awesome? You're goddamn right it is - Dining above…ptonewreckin (25)in #security • 6 years ago • NoneWindows + PythonA quick way to setup Python in Windows. Download Chocolatey - A package manager for Windows. choco install python2…ptonewreckin (25)in #security • 6 years ago • NoneGetting Jumpy With The Bash BunnyAfter weeks of waiting I've finally obtained my Bash Bunny. Essentially, the Bash Bunny serves as a small piece of…ptonewreckin (25)in #security • 6 years ago • NoneSSH Tunneling In WindowsEver wanted to use SSH on Windows? There are several tools we can use to do so including Plink/Putty/Bitvise. While…ptonewreckin (25)in #security • 6 years ago • NoneExploiting XXEXML External Entity (XXE) Injection: The vuln that keeps on giving... XXE Injection can occur when XML parsers are…