Tevora Threat Blog
Finding Broken Access Controls
This blog post is intended to be a guide on effective and efficient methods of identifying broken access control.
Attacking the Perimeter
Hackers, both white and black hat, depend considerably on open-source intelligence (OSINT) derived from publicly available information. Security professionals’ knowledge of OSINT collection methods and techniques is crucial for assessing threats. In this post we use tesla.com in some examples. We chose them solely due to the fact that…
DIY Leaked Credential Search Engine – Part 1
IntroductionThis post will walk through the process we followed to build a search engine for leaked credentials from publicly disclosed breaches/database leaks using Django REST Framework and PostgreSQL. At the end of this blog, you should have all you need to build an API and frontend Web Application that…
Atomic Red Team Windows Execution Engine
Atomic Red Team is an excellent collection of commands, activities, and other Indicators of Compromise (IoCs) developed and maintained by Red Canary that your blue team can benchmark against to hone their craft.
MuleSoft Runtime < 3.8 Unauthenticated RCE (CVE-2019-13116)
This blog post details a pre-authentication deserialization exploit in MuleSoft Runtime prior to version 3.8.
Physical Penetration Testing & Social Engineering
In this post, we will illustrate the roadmap of a physical penetration test and advise how to successfully infiltrate into a corporate environment.
Surveillance Detection Scout is a hardware and software stack that makes use of your Tesla’s cameras to tell you if you’re being followed in real-time.
Public Trust with PEAP Networks
With PEAP networks, authentication is performed via an MSChap handshake protected by a TLS tunnel. Since MSChap has been effectively broken