JumpsecLabs Profile Banner
JUMPSEC LABS Profile
JUMPSEC LABS

@JumpsecLabs

Followers
833
Following
100
Statuses
153

Here we share great research, tips and tricks by our technical teams at @jumpsec Follow us for regular #cybersecurity content https://t.co/7mhRQCRXHB

United Kingdom
Joined November 2014
Don't wanna be here? Send us removal request.
@JumpsecLabs
JUMPSEC LABS
2 years
Proud day for @JUMPSEC to have some of our #redteam #research posted on @BleepinComputer! Well done @CorbridgeMax and @tde_sec. If you've not already then drop a follow as we've got much more in pipeline! #security #IDOR #Microsoft #bug #bugbounty
@BleepinComputer
BleepingComputer
2 years
Microsoft Teams bug allows malware delivery from external accounts - @billtoulas
0
3
8
@JumpsecLabs
JUMPSEC LABS
7 days
Kicking-off a new year of LABS with BYOTB (Bring Your Own Trusted Binary) by our red teamer Dave - opening BSides London 2024 with this very talk! Read about using trusted binaries to tunnel through our target networks, circumventing EDR and more!
0
5
8
@JumpsecLabs
JUMPSEC LABS
2 months
This week is a foray into the world of disaster recovery, and the reasons that often prevent organisations from creating and battle hardening their Business Continuity Plans (BCPs):
0
2
2
@JumpsecLabs
JUMPSEC LABS
4 months
Learn more about Malicious Template Injection's in this week's blog post from our Detection and Response team!
0
0
3
@JumpsecLabs
JUMPSEC LABS
4 months
This week's blog is a practical guide to DLL Hijacking - check it out!
0
2
5
@JumpsecLabs
JUMPSEC LABS
4 months
Imagine the feeling of a long-forgotten canary token triggering in one of your client's estates, which leads you down a path to catch and remove a sophisticated red team... No need to imagine, as @umairq_ has written up a blog:
0
5
8
@JumpsecLabs
JUMPSEC LABS
5 months
This week's blog post is about some TTPs that are as old as time itself, but continue to land us quick wins on engagements. Check out our modern approach to relaying attacks, and how to abuse them:
0
6
18
@JumpsecLabs
JUMPSEC LABS
5 months
Stumbled on a rogue USB and wondered if it's safe to plug it in? Fear no more! Our DART's Part 2 guide on USB forensics provides a roadmap to analyze such devices safely!🫡 Check it out: #DFIR #DART #IR #soclife #detectionandresponse #infosec #rogueUSB
0
3
3
@JumpsecLabs
JUMPSEC LABS
6 months
Blog Post: The process behind investigating a malicious USB stick which landed on a client's desk! This week's post is from our Detection and Response Team (DART). Check it out!
0
0
0
@JumpsecLabs
JUMPSEC LABS
6 months
Check out this week's labs post on the current state of initial access security controls, and some guidance on how to bypass them! #initialaccess #bypass #securitycontrols #redteam
0
3
5
@JumpsecLabs
JUMPSEC LABS
7 months
Would you rather pop an on-premise application, or a cloud-hosted one? This week @CorbridgeMax has explored the implications of cloud migration on application security. Check it out! #cloud #migration #redteam #appsec #AWS #Azure
0
4
4
@JumpsecLabs
JUMPSEC LABS
8 months
Check out a super streamlined approach to bringing up an entire operational C2 infrastructure in just 5 mins in this week labs post! #C2 #infrastructure
0
4
12
@JumpsecLabs
JUMPSEC LABS
8 months
Practical steps and gotcha's for securing mail gateways can be found in this weeks labs post, from a JUMPSEC consultant - Check it out! #SPF #DKIM #DMARC #phishing #protection
0
3
4
@JumpsecLabs
JUMPSEC LABS
8 months
What happens when you give a red teamer a web application pentest? They shell it and write a custom DNS tunelling protocol to exfiltrate sensitive data 😎 Another great read this week: #aws #lambda #DNS #exfil #custom #protocol
0
4
7
@JumpsecLabs
JUMPSEC LABS
9 months
Tool Release! We've been having a lot of fun recently bypassing swathes of security controls using alternative web technologies to smuggle payloads right past mail security products. We've open-sourced the tool that we've been using to leverage WASM:
0
6
10
@JumpsecLabs
JUMPSEC LABS
9 months
Ever wondered what sort of exploits hit a honey pot server? In this week's blog post we dive into this question and do some malware analysis to understand what sort of exploits are being used out in the wild. Check it out: #malware #honeypot
0
3
6
@JumpsecLabs
JUMPSEC LABS
9 months
We often include compromising #DevOps environments as end goals of our #cloud #redteam engagements. We've written up our thoughts on common attack paths in these environments, starting with #azure Check it out!
0
5
8
@JumpsecLabs
JUMPSEC LABS
10 months
We've written up several lessons learned and gotcha's when it comes to pass spraying #M365 in this recent #blog post. We've been having a lot of fun with this attack recently on our #adversarial engagements. Check it out!
0
1
11
@JumpsecLabs
JUMPSEC LABS
10 months
🚨 Tool Release 🚨 We've just open-sourced our #automation scripts for setting up #vulnerable #Azure environments to practice #cloud red teaming. It's basically free to run and has hints to help you along your journey if needed 💪 #AHHHZURE
0
23
76
@JumpsecLabs
JUMPSEC LABS
1 year
Ending the year with a CVE from our Head of Adversarial Simulation @CorbridgeMax. Unauthenticated users are served the default Superuser account name and if the default password has been changed in IBM backup products, a single point of failure for backups
0
3
9
@JumpsecLabs
JUMPSEC LABS
1 year
Listen to our #adversarial #simulation team discuss the lessons they have learned from delivering entirely cloud red teams! From initial access to action on objectives, they cover it all #redteam #azure #aws #gcp #podcast #CyberSecurity
0
0
3