Compass Security Offensive Defense
Compass Security Blog Offensive Defense
- A Nifty Initial Access Payloadby Sylvain Heiniger on December 17, 2024 at 9:00 am
Red Teaming engagements are “realistic” attack simulations designed to test the security posture of an organization and its Blue Team. This term is used in many different ways, so if you’re not sure where to draw the line, Michael Schneier’s latest blog post provides a good comparison of different types of assessment. Anyway, when doing
- Harvesting GitLab Pipeline Secretsby Jan Friedli on December 3, 2024 at 8:00 am
TLDR: Scan GitLab job logs for credentials using https://github.com/CompassSecurity/pipeleak Many organizations use (self-hosted) GitLab instances to manage their source code and a lot of infrastructure is managed in code (IaC), thus these configurations must be source-controlled as well, putting a lot of responsibility on the source code platform in use. Often deployments are automated using CI/CD
- A Look Back: Insights from Our Managed Bug Bounty Programby Fabio Poloni on November 21, 2024 at 2:00 pm
At Compass Security, we are proud to offer a fully managed bug bounty program tailored to the needs of both SMEs and larger enterprises. From scoping to payout, we manage every aspect of the process to ensure a seamless experience for our customers and valued hunters. In this blog post, we’ll take a look at our journey since the launch of our service in October 2023, highlighting key milestones, metrics and learnings gathered along the way.
- Email, Email on the Wall, Who Sent You, After All?by Andreas Arnold on October 29, 2024 at 8:00 am
During Business Email Comproise (BEC) engagements we often have to analyze the provenance of emails. According to the FBI’s Internet Crime Report, BEC is one of the most financially damaging attacks, even surpassing ransomware in terms of losses. But how can we know all of this? Through email headers! This blog post tries to shed some light on the information contained within emails, what it means, and what can be done to prevent this type of attack.
- Voice Cloning with Deep Learning Modelsby Nicolo Fornari on October 18, 2024 at 7:00 am
Given the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how and find applications where these technologies can be leveraged in offensive security engagements. This posts explores the use of machine learning for voice cloning and how it can be used for social engineering.
- COM Cross-Session Activationby Sylvain Heiniger on October 1, 2024 at 7:00 am
Once again, reading blogs and tweets from James Forshaw led me to wonder how things work. This time, I was working on DCOM for my last blog post and while reading about cross-session activation, I had trouble believing what I was reading.
- Three-Headed Potato Dogby Sylvain Heiniger on September 17, 2024 at 1:30 pm
Earlier this year, several security researchers published research about using DCOM to coerce Windows systems to authenticate to other systems. This can be misused to relay the authentication to NTLM or Kerberos, to AD CS over HTTP for instance. This sounds like a hot and complex topic. Let’s take a look back how this started
- From Classroom into Bug Bounty: Investigating Motivational Factors Among Swiss Studentsby Adrian Kress on September 6, 2024 at 6:00 am
Bug bounty programs have evolved into a critical element of modern cybersecurity. In this post, we give some answers to how bug bounty programs can attract students as hunters.
- A Patchdiffing Journey – TP-Link Omadaby Yves Bieri on August 20, 2024 at 7:00 am
Last year we participated in the Pwn2Own 2023 Toronto competition and successfully exploited the Synology BC500 camera. The DEVCORE Internship Program team managed to exploit a bug in the TP-Link Omada Gigabit VPN Router. So I was naturally curious and wanted to figure out how difficult it would be to recreate that exploit having access only to a high-level bug description and the firmware.
- SAML Raider Release 2.0.0by Tobias Hort-Giess on July 2, 2024 at 7:00 am
SAML Raider is a Burp Suite extension and the tool of choice for many pentesters for testing SAML infrastructures. This blog post should give a brief introduction to what has changed in the new version 2.0.0. From Improving developer and user experience to bug fixes.