Homepage
Open in app
Sign in
Get started
Section 9 Lab
Information Security & Hacking ideas
Follow
Following the white Rabbit
Following the white Rabbit
Down the SAML Code
マティアス
May 3, 2017
Subsidizing the rise of the machines
Subsidizing the rise of the machines
Kick-starting your automation with “cheap labor” as a service. The rise of machines by companies developing disruptive technologies and…
Section 9 Labs
Oct 6, 2016
Cartero — Automating Phishing Mail <Forms> requests
Cartero — Automating Phishing Mail <Forms> requests
Many websites [un]willingly allow users to send emails through a simple web request. Knowing this we can automate phishing campaigns with…
Section 9 Labs
Mar 23, 2015
Latest
Exploiting Lync for iOS to gather OSINT and force join conference calls.
Exploiting Lync for iOS to gather OSINT and force join conference calls.
Based on our research reported about url-handlers on FaceTime and Messages, here it comes the “Enterprise version”.
Section 9 Labs
Jan 2, 2015
Paid apps, do come with a price …
Paid apps, do come with a price …
Exploiting multiple URL handlers in alternative web-browsers
Section 9 Labs
Oct 13, 2014
Abusing iOS url handlers on Messages
Abusing iOS url handlers on Messages
Exploiting iOS Chrome and FaceTime url-handlers to automate attacks on FaceTime calls through Messages with Cartero
Section 9 Labs
Sep 23, 2014
Automated LinkedIn Social Engineering Attacks
Automated LinkedIn Social Engineering Attacks
Social Networks and Social Engineering were meant for each other. Nowadays, people willingly share their private information contact…
Section 9 Labs
Sep 1, 2014
About Section 9 Lab
Latest Stories
Archive
About Medium
Terms
Privacy
Teams