• Our Services
  • Knowledge Centre
  • About
  • Contact
  • Our Services
    • Adversary Simulation
    • Application Security
    • Penetration Testing
    • Response
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Contact
  • Adversary

    Adversary Simulation

    Our best in class red team can deliver a holistic cyber attack simulation to provide a true evaluation of your organisation’s cyber resilience.

  • Application Security

    Application
    Security

    Leverage the team behind the industry-leading Web Application and Mobile Hacker’s Handbook series.

  • Penetration Testing

    Penetration
    Testing

    MDSec’s penetration testing team is trusted by companies from the world’s leading technology firms to global financial institutions.

  • Response

    Response

    Our certified team work with customers at all stages of the Incident Response lifecycle through our range of proactive and reactive services.

  • Research

    MDSec’s dedicated research team periodically releases white papers, blog posts, and tooling.

  • Training

    MDSec’s training courses are informed by our security consultancy and research functions, ensuring you benefit from the latest and most applicable trends in the field.

  • Insights

    View insights from MDSec’s consultancy and research teams.

  • Payload Generation using SharpShooter

    Mar 7th, 2018

    Written by: Admin

    ActiveBreach

    Getting a foothold is often one of the most complex and time-consuming aspects of an adversary simulation. We typically find much of our effort is spent creating and testing payloads…

  • Adobe Flash Exploitation, Then and Now: From CVE-2015-5119 to CVE-2018-4878

    Feb 9th, 2018

    Written by: Admin

    ActiveBreach

    Last week, it was reported that an exploit was being used to spread the ROKRAT malware. What made this so interesting is that Flash was being used by an APT…

  • Advisory: CVE-2017-10927 – Sophos Web Appliance PPD Injection

    Sep 15th, 2017

    Written by: Admin

    Exploitation

    Overview Sophos Web Appliance is a “next generation” anti-malware and content filtering proxy appliance created by Sophos. Description During a review of Sophos Web Appliance, MDSec discovered a remote code…

  • Exploiting CVE-2017-8759: SOAP WSDL Parser Code Injection

    Sep 13th, 2017

    Written by: Admin

    ActiveBreach

    Introduction CVE-2017-8759, the vulnerability recently discovered by FireEye as being exploited in the wild is a code injection vulnerability that occurs in the .NET framework when parsing a WSDL using…

  • Exploiting CVE-2017-0199: HTA Handler Vulnerability

    Apr 13th, 2017

    Written by: Admin

    ActiveBreach

    FireEye recently documented attacks of a 0-day vulnerability in the Windows HTA handler being exploited in the wild using Office RTF documents. The vulnerability later became referenced as CVE-2017-0199 and addressed…

  • Penetration Testing Skype for Business: Exploiting the Missing Lync

    Apr 11th, 2017

    Written by: Admin

    ActiveBreach

    Around a year ago, Black Hills documented multiple ways to obtain domain credentials from the outside using password spraying against Outlook Web Access. They then went on to release MailSniper,…

  • Containerised Browsing with Docker

    Mar 23rd, 2017

    Written by: Admin

    Exploitation

    This year’s Pwn2Own contest saw the majority of the main stream browsers being compromised once again, highlighting that we still have some way to go for a secure browsing experience….

  • Eventvwr File-less UAC Bypass CNA

    Dec 6th, 2016

    Written by: Admin

    ActiveBreach

    Matt Nelson recently released a very useful, file-less UAC bypass using Event Viewer which was quickly implemented in to a Metasploit module by @TheColonial. Following this, we decided to release our own implementation…

  • Building an IoT Botnet: BSides Manchester 2016

    Oct 3rd, 2016

    Written by: Admin

    Exploitation

    In August, @MDSecLabs delivered a talk at the Manchester BSides titled “Breaking and Entering, Hacking Consumer Security Systems”. The talk outlined research that we had performed in to the security (or…

  • Tool Release: CredHunter

    Jan 22nd, 2016

    Written by: Admin

    ActiveBreach

    Sometimes when conducting internal assessments or even simulated attacks, you may want the ability to quickly identify weak credentials in your environment. We often faced this problem which led to…

Page 4 of 5First«3 4 5»

Recent Posts:

  • Disabling Security Features in a Locked BIOS
  • RIP RegPwn
  • Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM
  • Function Peekaboo: Crafting self masking functions using LLVM
  • How Scattered Spider Exploited Weak Links in UK Retail Security

Archive:

  • March 2026
  • February 2026
  • October 2025
  • March 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • June 2024
  • April 2024

Page Links:

  • Responsible Disclosure Policy
  • Nighthawk
  • Privacy Policy
  • MUTUAL NON-DISCLOSURE AGREEMENT
  • Home
  • Our Services
    • Adversary Simulation
      • Red Team Operations
      • Purple Teaming
    • Application Security
      • Application Security
      • Large Language Models
      • Mobile Security
    • Penetration Testing
      • Infrastructure Security
      • Product Assessment
      • Cloud Security Assessment
    • Response
      • Retained Response
      • Emergency Response
      • Cyber Readiness
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Careers
  • News
  • Contact
MDsec

Services

  • Adversary Simulation
  • Application Security
  • Penetration Testing
  • Response

Resource Centre

  • Research
  • Training
  • Insights

Company

  • About
  • Contact
  • Careers
  • Privacy

t: +44 (0) 1625 263 503
e: contact@mdsec.co.uk

32A Park Green
Macclesfield
Cheshire
SK11 7NA

Accreditations

Best
IT Health Check Service
Crest Star
Crest
Cyber Essentials
British Assessment Bureau
Copyright 2026 MDSec