User Enumeration Part 2 – Microsoft Office 365

User Enumeration Part 2 – Microsoft Office 365

By Mike Saunders | March 10, 2020

It’s not uncommon on external pen tests and red team engagements to find very little attack surface on the customer’s internet-facing networks. Customers have started shifting services to cloud providers, […]

Learn More
User Enumeration Part 2 – Microsoft Office 365

User Enumeration Part 1 – Building Name Lists

By Mike Saunders | January 30, 2020

A common part of pen tests – both network and web app – is password spraying. In order to do that, you need usernames. But how do you find out […]

Learn More
User Enumeration Part 1 – Building Name Lists

SQLi Data Exfiltration via DNS

By Mike Saunders | November 30, 2018

Did you know you can use DNS queries to exfiltrate data from a database via SQLi? No? Then continue reading! I’ll walk through some techniques you can use to enumerate […]

Learn More
SQLi Data Exfiltration via DNS

Maintaining Session States in .NET Apps With Burp

By Mike Saunders | September 21, 2018

During a recent web app test, I encountered a situation when I would be randomly logged out of the application when running sqlmap. I wasn’t manipulating any of the session […]

Learn More
Maintaining Session States in .NET Apps With Burp

Capturing SQL Server User Hash with SQLi

By Mike Saunders | September 5, 2018

On a recent external web app pen test, I found a possible SQL injection vulnerability using the Burp Scanner. One of the tests triggered an A record lookup for the […]

Learn More
Capturing SQL Server User Hash with SQLi