For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
A Look in the Mirror – The Reflective Kerberos Relay Attack
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
10 months ago
|
past
The Guide to Windows Coercion Techniques in 2025
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
10 months ago
|
past
Advisory: Docusnap inventory files encrypted with static key
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on March 4, 2025
|
past
Critical Vulnerabilities in WatchGuard SSO Agent
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on Sept 25, 2024
|
past
Back to School – Exploiting a Remote Code Execution Vulnerability in Moodle
(
redteam-pentesting.de
)
2 points
by
RedTeamPT
on Aug 27, 2024
|
past
Bitwarden Heist – How to break into password vaults without using passwords
(
redteam-pentesting.de
)
325 points
by
RedTeamPT
on Jan 3, 2024
|
past
|
200 comments
Better DSAFER Than Sorry – An Attacker's Overview of Ghostscript
(
redteam-pentesting.de
)
2 points
by
RedTeamPT
on Oct 11, 2023
|
past
Resocks – An Encrypted Back-Connect Socks Proxy for Network Pivoting
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on May 9, 2023
|
past
Rooting a Common-Criteria Certified Printer to Improve Opsec
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on April 12, 2023
|
past
Credential Disclosure in Web Interface of Crestron Device
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on Oct 24, 2022
|
past
Introducing Pretender: Your New Sidekick for Relaying Attacks
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on July 13, 2022
|
past
A PBX – Discovering a Firmware Backdoor
(
redteam-pentesting.de
)
6 points
by
todsacerdoti
on Dec 21, 2021
|
past
|
2 comments
Inside a PBX – Discovering a Firmware Backdoor
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on Dec 20, 2021
|
past
Remarkable Encryption – From Threat Model to Final Implementation
(
redteam-pentesting.de
)
1 point
by
client4
on June 21, 2021
|
past
Remarkable Encryption – From Threat Model to Final Implementation
(
redteam-pentesting.de
)
1 point
by
RedTeamPT
on May 25, 2021
|
past
Wholesome Curl Calls for Your Blog Posts
(
redteam-pentesting.de
)
4 points
by
RedTeamPT
on March 4, 2021
|
past
How to Trace Down a Deserialisation Gadget Chain in PHP
(
redteam-pentesting.de
)
2 points
by
RedTeamPT
on Jan 4, 2021
|
past
Introducing monsoon – a lean and versatile HTTP enumerator
(
redteam-pentesting.de
)
2 points
by
RedTeamPT
on Dec 2, 2020
|
past
Diving into a WebSocket Vulnerability in Apache Tomcat
(
redteam-pentesting.de
)
1 point
by
simonpure
on Nov 3, 2020
|
past
Analysing the WebSocket Vulnerability in Apache Tomcat (CVE-2020-13935)
(
redteam-pentesting.de
)
2 points
by
RedTeamPT
on Nov 2, 2020
|
past
CyberArk Password Vault Web Access Remote Code Execution
(
redteam-pentesting.de
)
1 point
by
wglb
on April 12, 2018
|
past
AVM FRITZBox: Remote Code Execution via Buffer Overflow
(
redteam-pentesting.de
)
1 point
by
lukashed
on Jan 9, 2016
|
past
Man-in-the-Middle Attacks against chipTAN
(
redteam-pentesting.de
)
2 points
by
seven
on Nov 24, 2009
|
past
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.