Exploits

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Exploits

  • Copy Fail - Local Linux Privilege Escalation in 4 lines

    Copy Fail – Local Linux Privilege Escalation in 4 lines

    By Jason Taylor CVE-2026-31431, dubbed Copy Fail, allows privilege escalation to root on Linux distros missing the latest kernel patches. Learn what to do in this blog. May 8, 2026
  • No Malware Required

    No Malware Required

    By Brian Tant The March 2026 attack on Stryker Corporation was not Malware and did not make Ransomware demands. Instead it used compromised credentials to disrupt business. May 1, 2026
  • The Face on Your Screen Might Not Be Real

    Deepfakes: The Face on Your Screen Might Not Be Real

    By Scottie Cole Phishing and other social engineering techniques have crossed a threshold with deepfake attacks. Scottie Cole discusses how to protect your organization. April 17, 2026
  • Two Critical Telnet Flaws in 2026 Allow Unauthenticated Root Access

    Two Critical Telnet Flaws in 2026 Allow Unauthenticated Root Access

    By Ryan Chaplin Lead Penetration Ryan Chaplin explains how to protect your network against CVE-2026-24061 and CVE-2026-32746, two critical Telnet flaws released this year. April 10, 2026
  • Five Things to Always Do After Getting Domain Admin

    Five Things to Always Do After Getting Domain Admin

    By Andrew Trexler So you got DA on your red team or internal network penetration test. Here are the five things that Principal Penetration Tester Andrew Trexler does next. March 24, 2026
  • BYOVD Attacks and EDR Evasion: Why Your Endpoint Security May Not Be Enough

    BYOVD Attacks and EDR Evasion: Why Your Endpoint Security May Not Be Enough

    By Brian Tant With Reynolds Ransomware in the wild, Brian Tant dives into BYOVD attacks, how they evade enterprise defense like EDRs, and what your organization can do. March 18, 2026