Ioana Daniela RijnetuinPentest-Tools.comHow to exploit the DotNetNuke Cookie DeserializationWe looked at around 300 DotNetNuke deployments in the wild and discovered that one in five installations was vulnerable to CVE-2017–9822…Jun 16, 2020Jun 16, 2020
Ioana Daniela RijnetuinPentest-Tools.comHow to exploit the PHAR Deserialization VulnerabilityDeserialization vulnerabilities have been a topic of interest for the research community for more than a decade now. Every year, new…Jun 2, 2020Jun 2, 2020
Ioana Daniela RijnetuinPentest-Tools.comPentest-Tools.com Offers Free Website Pentest Services to Organizations Fighting COVID-19Our top priority is helping our customers become resilient against cyberattacks, even more so in critical times.Mar 27, 2020Mar 27, 2020
Ioana Daniela RijnetuinPentest-Tools.comHow to detect SMBGhost and GhostCat vulnerabilities with Pentest-Tools.comWe are happy to inform you that we have two new scanners on the platform, which detect two recent and critical vulnerabilities.Mar 17, 2020Mar 17, 2020
Ioana Daniela RijnetuinPentest-Tools.comHow to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing…Feb 21, 2020Feb 21, 2020
Ioana Daniela RijnetuinPentest-Tools.comNew Tool for Detecting the Critical Citrix RCE Vulnerability (CVE-2019–19781)To help our customers assess the security of their Citrix ADC and Citrix Gateway devices, we, at Pentest-Tools.com, have added a new tool…Jan 15, 2020Jan 15, 2020
Ioana Daniela RijnetuinPentest-Tools.comHow to detect the SACK Panic vulnerability with WiresharkOur security researchers have recently performed an in-depth analysis of the SACK Panic vulnerability (which was first disclosed in June…Jan 10, 2020Jan 10, 2020
Ioana Daniela RijnetuinPentest-Tools.comAnalysis of recent Exim mail server vulnerabilitiesFor the past months, multiple critical vulnerabilities were found in Exim mail servers that could allow attackers to gain remote access…Oct 16, 2019Oct 16, 2019
Ioana Daniela RijnetuinPentest-Tools.comHow to Perform Internal Network Scanning with Pentest-Tools.comWe are happy to announce we have a new capability on our platform that uses VPN tunnels to reach the internal networks.Oct 2, 2019Oct 2, 2019
Ioana Daniela RijnetuinPentest-Tools.comHow to Exploit BlueKeep Vulnerability with Metasploit (security research)The Pentest-Tools.com security team has tested the recently announced Metasploit module for BlueKeep, the critical Remote Code Execution…Sep 12, 2019Sep 12, 2019