• Our Services
  • Knowledge Centre
  • About
  • Contact
  • Our Services
    • Adversary Simulation
    • Application Security
    • Penetration Testing
    • Response
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Contact
  • Adversary

    Adversary Simulation

    Our best in class red team can deliver a holistic cyber attack simulation to provide a true evaluation of your organisation’s cyber resilience.

  • Application Security

    Application
    Security

    Leverage the team behind the industry-leading Web Application and Mobile Hacker’s Handbook series.

  • Penetration Testing

    Penetration
    Testing

    MDSec’s penetration testing team is trusted by companies from the world’s leading technology firms to global financial institutions.

  • Response

    Response

    Our certified team work with customers at all stages of the Incident Response lifecycle through our range of proactive and reactive services.

  • Research

    MDSec’s dedicated research team periodically releases white papers, blog posts, and tooling.

  • Training

    MDSec’s training courses are informed by our security consultancy and research functions, ensuring you benefit from the latest and most applicable trends in the field.

  • Insights

    View insights from MDSec’s consultancy and research teams.

  • Covert Web Shells in .NET with Read-Only Web Paths

    Oct 15th, 2020

    Written by: Admin

    ActiveBreach

    In a recent red team engagement, we discovered a SharePoint instance that was vulnerable to CVE-2020-1147. I was asked to build a web shell without running any commands to avoid…

  • I Like to Move It: Windows Lateral Movement Part 3: DLL Hijacking

    Oct 12th, 2020

    Written by: Admin

    ActiveBreach

    Overview In the past two posts of this series, we’ve covered lateral movement through WMI event subscriptions and DCOM, detailing approaches to improve the OpSec of our tradecraft. In the…

  • I Like to Move It: Windows Lateral Movement Part 2 – DCOM

    Sep 17th, 2020

    Written by: Admin

    ActiveBreach

    Overview In part 1 of this series, we discussed lateral movement using WMI event subscriptions. During this post we will discuss another of my “go to” techniques for lateral movement,…

  • I Like to Move It: Windows Lateral Movement Part 1 – WMI Event Subscription

    Sep 1st, 2020

    Written by: Admin

    ActiveBreach

    Overview Performing lateral movement in an OpSec safe manner in mature Windows environments can often be a challenge as defenders hone their detections around the indicators generated by many of…

  • Massaging your CLR: Preventing Environment.Exit in In-Process .NET Assemblies

    Aug 24th, 2020

    Written by: Admin

    ActiveBreach

    At MDSec it not uncommon to need to develop custom post-exploitation tooling to meet the requirements of an engagement; this is especially true for the red team where the techniques employed for tasks such as information gathering and lateral movement often need to be adapted to the target environment.

  • FireWalker: A New Approach to Generically Bypass User-Space EDR Hooking

    Aug 17th, 2020

    Written by: Admin

    ActiveBreach

    Introduction During red team engagements, it is not uncommon to encounter Endpoint Defence & Response (EDR) / Prevention (EDP) products that implement user-land hooks to gain insight in to a…

  • Detecting and Advancing In-Memory .NET Tradecraft

    Jun 10th, 2020

    Written by: Admin

    ActiveBreach

    Introduction In-memory tradecraft is becoming more and more important for remaining undetected during a red team operation, with it becoming common practice for blue teams to peek in to running…

  • T1111: Two Factor Interception, RSA SecurID Software Tokens

    Awaiting Image

    May 10th, 2020

    Written by: Admin

    ActiveBreach

    Introduction During Red Team Operations, it is not uncommon to find systems or applications related to the engagement objectives being protected by Two Factor Authentication. One of the solutions that…

  • Abusing Firefox in Enterprise Environments

    Awaiting Image

    Apr 10th, 2020

    Written by: Admin

    ActiveBreach

    Introduction In this blogpost, we will describe a technique that abuses legacy Firefox functionality to achieve command execution in enterprise environments. These capabilities can be used for lateral movement, persistence…

  • Designing The Adversary Simulation Lab

    Awaiting Image

    Apr 10th, 2020

    Written by: Admin

    ActiveBreach

    As some of you will know, we have recently entered into the Red Team training space. Before deciding to create our course now known as “Adversary Simulation and Red Team…

Page 5 of 9First«4 5 6»Last

Recent Posts:

  • Red Teaming with ServiceNow
  • Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris)
  • Nighthawk 0.3.3 – Evanesco
  • From Panic to Prepared: How To Become DORA Compliant
  • When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls

Archive:

  • March 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • June 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024

Page Links:

  • Responsible Disclosure Policy
  • Nighthawk
  • Privacy Policy
  • MUTUAL NON-DISCLOSURE AGREEMENT
  • Home
  • Our Services
    • Adversary Simulation
      • Red Team Operations
      • Purple Teaming
    • Application Security
      • Application Security
      • Large Language Models
      • Mobile Security
    • Penetration Testing
      • Infrastructure Security
      • Product Assessment
      • Cloud Security Assessment
    • Response
      • Retained Response
      • Emergency Response
      • Cyber Readiness
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Careers
  • News
  • Contact
MDsec

Services

  • Adversary Simulation
  • Application Security
  • Penetration Testing
  • Response

Resource Centre

  • Research
  • Training
  • Insights

Company

  • About
  • Contact
  • Careers
  • Privacy

t: +44 (0) 1625 263 503
e: contact@mdsec.co.uk

32A Park Green
Macclesfield
Cheshire
SK11 7NA

Accreditations

Best
IT Health Check Service
Crest Star
Crest
Cyber Essentials
British Assessment Bureau
Copyright 2025 MDSec