Research & Tutorials | OffSec

Blog

Research & Tutorials

OffSec experts share cutting-edge vulnerability research, tool reviews, tutorials, virtual lab and content walkthroughs.
Cloning RFID Tags with Proxmark 3
Research & Tutorials

Sep 24, 2012

5 min read

RFID Cloning with Proxmark 3

Our Proxmark 3 (and antennae) finally arrived, and we thought we’d take it for a spin. It’s a great little device for physical pentests, allowing us to capture, replay and clone certain RFID tags.

Read more
FreePBX Exploit Phone Home

Research & Tutorials

FreePBX Exploit Phone Home

During a routine scan of new vulnerability reports for the Exploit Database, we came across a single post in full disclosure by Martin Tschirsich, about a Remote Code Execution vulnerability in FreePBX. This vulnerability sounded intriguing, and as usual, required verification in the EDB. At first glance, the vulnerability didn’t jump out at us, especially as we are not familiar with the inner workings of asterisk. After a couple of emails back and forth with Martin, the path to code execution became clearer:

Mar 23, 2012

3 min read

The Art of Human Hacking

Research & Tutorials

The Art of Human Hacking

It’s hard to believe that the social-engineer.org project began 14 months ago. This project started from a simple idea ­ to build the world’s first framework for social engineers. In these 14 months, this project has grown into the leading resource for all real social engineering education. The CTF that we held at Defcon 18 proved beyond doubt that this resource was greatly required.

Dec 19, 2010

2 min read

Godaddy Workspace XSS

Research & Tutorials

Godaddy Workspace XSS – Who’s your Daddy ?

An interesting submission in from the Exploit Database – a Godaddy workspace XSS vulnerability. Although we did not post it (live site), the vulnerability seems real, and definitely worth mentioning.

Dec 11, 2010

1 min read

offsec-edb-slider-image

Research & Tutorials

Offensive Security Exploit Archive Online

Offensive Security Exploit Database, as well as Vulnerable applications is now Online

Nov 16, 2009

1 min read

Showing 40 - 44 of 44 entries