• Our Services
  • Knowledge Centre
  • About
  • Contact
  • Our Services
    • Adversary Simulation
    • Application Security
    • Penetration Testing
    • Response
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Contact
  • Adversary

    Adversary Simulation

    Our best in class red team can deliver a holistic cyber attack simulation to provide a true evaluation of your organisation’s cyber resilience.

  • Application Security

    Application
    Security

    Leverage the team behind the industry-leading Web Application and Mobile Hacker’s Handbook series.

  • Penetration Testing

    Penetration
    Testing

    MDSec’s penetration testing team is trusted by companies from the world’s leading technology firms to global financial institutions.

  • Response

    Response

    Our certified team work with customers at all stages of the Incident Response lifecycle through our range of proactive and reactive services.

  • Research

    MDSec’s dedicated research team periodically releases white papers, blog posts, and tooling.

  • Training

    MDSec’s training courses are informed by our security consultancy and research functions, ensuring you benefit from the latest and most applicable trends in the field.

  • Insights

    View insights from MDSec’s consultancy and research teams.

  • Exploiting CVE-2023-23397: Microsoft Outlook Elevation of Privilege Vulnerability

    Mar 14th, 2023

    Written by: Admin

    ActiveBreach

    Date: 14th March 2023 Today saw Microsoft patch an interesting vulnerability in Microsoft Outlook. The vulnerability is described as follows: Microsoft Office Outlook contains a privilege escalation vulnerability that allows…

  • Nighthawk: With Great Power Comes Great Responsibility

    Nov 23rd, 2022

    Written by: Admin

    ActiveBreach

    Recently, Proofpoint released a blog post entitled “Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice”. In this post, Proofpoint outlined a campaign used by a legitimate red…

  • Nighthawk 0.2.1 – Haunting Blue

    Nov 1st, 2022

    Written by: Admin

    ActiveBreach

    November 1st 2022 This Halloween week brings our third and final Nighthawk release for the year and its packed with exciting new features, backed by MDSec’s world class research and…

  • Autodial(DLL)ing Your Way

    Oct 26th, 2022

    Written by: Admin

    ActiveBreach

    The use of the AutodialDLL registry subkey (located in HKLM\\SYSTEM\\CurrentControlSet\\Services\\WinSock2\\Parameters) as a persistence method has been previously documented by @Hexacorn in his series Beyond good ol’ Run key, (Part 24)….

  • Microsoft Office Online Server Remote Code Execution

    Oct 19th, 2022

    Written by: Admin

    ActiveBreach

    Microsoft’s Office Online Server is the next generation of Office Web Apps Server; it provides a browser based viewer/editor for Word, PowerPoint, Excel and OneNote documents. The product can be…

  • Analysing LastPass, Part 1

    Oct 12th, 2022

    Written by: Admin

    ActiveBreach

    Having been in IT longer than I care to remember, one issue keeps coming up. It doesn’t matter how well you have implemented <insert security mechanism> what really matters is…

  • PART 3: How I Met Your Beacon – Brute Ratel

    Aug 3rd, 2022

    Written by: Admin

    ActiveBreach

    Introduction In part one, we introduced generic approaches to performing threat hunting of C2 frameworks and then followed it up with practical examples against Cobalt Strike in part two. In…

  • Fourteen Ways to Read the PID for the Local Security Authority Subsystem Service (LSASS)

    Aug 2nd, 2022

    Written by: Admin

    ActiveBreach

    Introduction Process enumeration is necessary prior to injecting shellcode or dumping memory. Threat actors tend to favour using CreateToolhelp32Snapshot with Process32First and Process32Next to gather a list of running processes….

  • PART 2: How I Met Your Beacon – Cobalt Strike

    Jul 25th, 2022

    Written by: Admin

    ActiveBreach

    Cobalt Strike is one of the most popular command-and-control frameworks, favoured by red teams and threat actors alike. In this blog post we will discuss strategies that can be used…

  • PART 1: How I Met Your Beacon – Overview

    Jul 22nd, 2022

    Written by: Admin

    ActiveBreach

    Introduction Its no secret that MDSec provides a commercial command-and-control framework with a focus on evasion for covert operations. With this in mind, we are continuously performing on-going R&D in…

Page 3 of 14First«2 3 4»Last

Recent Posts:

  • Disabling Security Features in a Locked BIOS
  • RIP RegPwn
  • Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM
  • Function Peekaboo: Crafting self masking functions using LLVM
  • How Scattered Spider Exploited Weak Links in UK Retail Security

Archive:

  • March 2026
  • February 2026
  • October 2025
  • March 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • June 2024
  • April 2024

Page Links:

  • Responsible Disclosure Policy
  • Nighthawk
  • Privacy Policy
  • MUTUAL NON-DISCLOSURE AGREEMENT
  • Home
  • Our Services
    • Adversary Simulation
      • Red Team Operations
      • Purple Teaming
    • Application Security
      • Application Security
      • Large Language Models
      • Mobile Security
    • Penetration Testing
      • Infrastructure Security
      • Product Assessment
      • Cloud Security Assessment
    • Response
      • Retained Response
      • Emergency Response
      • Cyber Readiness
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Careers
  • News
  • Contact
MDsec

Services

  • Adversary Simulation
  • Application Security
  • Penetration Testing
  • Response

Resource Centre

  • Research
  • Training
  • Insights

Company

  • About
  • Contact
  • Careers
  • Privacy

t: +44 (0) 1625 263 503
e: contact@mdsec.co.uk

32A Park Green
Macclesfield
Cheshire
SK11 7NA

Accreditations

Best
IT Health Check Service
Crest Star
Crest
Cyber Essentials
British Assessment Bureau
Copyright 2026 MDSec