The Exploit articles categorized as How To
-

Log4j: How to Exploit and Test this Critical Vulnerability on Penetration Tests
By Mark Puckett Raxis demonstrates how to obtain a remote shell on a target system during penetration tests using a Log4j open-source exploit available to all. (CVE-2021-44228) November 18, 2022 -

Exploiting Dirty Pipe (CVE-2022-0847)
By Andrew Trexler The Dirty Pipe vulnerability (CVE-2022-0847) allows any user to write to read-only files, including files that are owned by root, allowing privilege escalation. May 26, 2022 -

Hackers See Opportunity Where You See Only a Button
By Brad Herring In this post, Raxis VP Brad Herring explains how web proxy tools can turn even simple buttons and check-boxes into avenues for an attack. April 1, 2022 -

How to Hire a Penetration Testing Firm – Part 2
By Bonnie Smyre Is your organization is in the market for a penetration test? Raxis’ COO Bonnie Smyre continues her two-part series on how to hire a penetration testing firm. March 18, 2022 -

How to Hire a Penetration Testing Firm – Part 1
By Bonnie Smyre Raxis’ COO Bonnie Smyre offers some helpful hints about how to start the process of hiring a penetration testing company. February 25, 2022 -

Reporting Tools for Large Penetration Tests
By Raxis Research Team Raxis lead penetration tester Matt Dunn has developed three new tools to make it easier to compile and present findings from large penetration tests. February 11, 2022