Blog
Apr 27, 2010
Penetration Testing in the Real World
Penetration Testing video by Offensive Security – Real world scenario.
1 min read

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text]
Penetration Testing in the real world. If you are tired of “Hacking with Netcat” webcasts or “Penetration Testing with RPC DCOM”, then this movie is for you. It’s a quick reconstruction of a Security Audit we preformed over a year ago, replicated in our labs. The video is under 20 minutes long, and highly edited – attacks rarely go as quickly and smoothly as this ! Check it out here :
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner parallax_image=”” section=”” full_screen=”” vertical_centering=”” full_width=”” full_height=”” background=”” bg_color_info=”” img=”” parallax=”” parallax_bg_width=”110″ parallax_reverse=”” video=”” bg_type=”” parallax_style=”” bg_image_new=”” layer_image=”” bg_image_repeat=”” bg_image_size=”” bg_cstm_size=”” bg_img_attach=”” parallax_sense=”” bg_image_posiiton=”” animation_direction=”” animation_repeat=”” video_url=”” video_url_2=”” u_video_url=”” video_opts=”” video_poster=”” u_start_time=”” u_stop_time=”” viewport_vdo=”” enable_controls=”” bg_override=”” disable_on_mobile_img_parallax=”” parallax_content=”” parallax_content_sense=”” fadeout_row=”” fadeout_start_effect=”” enable_overlay=”” overlay_color=”” overlay_pattern=”” overlay_pattern_opacity=”” overlay_pattern_size=”” overlay_pattern_attachment=”” multi_color_overlay=”” multi_color_overlay_opacity=”” seperator_enable=”” seperator_type=”” seperator_position=”” seperator_shape_size=”” seperator_svg_height=”” seperator_shape_background=”” seperator_shape_border=”” seperator_shape_border_color=”” seperator_shape_border_width=”” icon_type=”” icon=”” icon_size=”” icon_color=”” icon_style=”” icon_color_bg=”” icon_border_style=”” icon_color_border=”” icon_border_size=”” icon_border_radius=”” icon_border_spacing=”” icon_img=”” img_width=”” ult_hide_row=”” ult_hide_row_large_screen=”” ult_hide_row_desktop=”” ult_hide_row_tablet=”” ult_hide_row_tablet_small=”” ult_hide_row_mobile=”” ult_hide_row_mobile_large=””][vc_column_inner][us_separator size=”custom” height=”32px”][vc_column_text][/vc_column_text][us_separator size=”custom” height=”32px”][/vc_column_inner][/vc_row_inner][vc_row_inner section=”” full_screen=”” vertical_centering=”” full_width=”” full_height=”” background=”secondary” parallax_bg_width=”110″ parallax_reverse=”” video=”” video_opts=”” multi_color_overlay=””][vc_column_inner][us_separator show_line=”1″][vc_column_text]
Looking for something else? Browse all of our Penetration Testing and Professional Services.
[/vc_column_text][us_separator size=”custom” height=”10px”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read