Headshot of Ryan Gandrud

Ryan Gandrud

More by Ryan Gandrud

Cloud Pentesting

Targeting Passwords for Managed and Federated Microsoft Accounts

This blog dives into the two different ways a Microsoft domain can support cloud authentication; managed and federated.

Learn More
Adversary Simulation

Adding Web Content Filter Exceptions for Phishing Success

During phishing engagements, one of the key steps is to ensure that targeted users can access your phishing website. These filtering services can often cause problems...

Learn More
Adversary Simulation

All You Need Is One – A ClickOnce Love Story

Although there are many legitimate advantages to using ClickOnce deployments, it also provides a vector for malicious actors to compromise user’s machines with just one click.

Learn More
Network Pentesting

Bypassing AV with Veil-Evasion

Veil-Framework is a collection of tools that help with information gathering and post-exploitation. One such tool is Veil-Evasion which is used for creating payloads that can easily bypass Antivirus using known and documented techniques. This is done through an array of encoding schemes that change the signatures of files dramatically enough to avoid standard detection techniques.

Learn More
Network Pentesting

15 Ways to Download a File

Pentesters often upload files to compromised boxes to help with privilege escalation, or to maintain a presence on the machine. This blog will cover 15 different ways to move files from your machine to a compromised system.

Learn More
Network Pentesting

Executing MSF Payloads via PowerShell Webshellery

Many web applications come with the ability to upload files to the server. Some of these can be misconfigured and allow for arbitrary file upload. During these situations, this module for MetaSploit can come in handy if the backend server is Windows.

Learn More