Scorpion Labs Blog

Header_strip
blog-bg-shape
Hello Open Hash API
Introduction Hash cracking plays a valuable role when penetration test...
Read More
The Paradigms of Security Testing
Security testing is an indispensable part of any comprehensive securit...
Read More
Java Deserialization Gadget Chains
Intro In my short security testing history, Java deserialization vulne...
Read More
Let's Talk About X! (The X Window System, Of Course!)
Foreword Of course, I meant the X Window System, right? Definitely not...
Read More
Sometimes Exploits Need Patches Too! Working Through a Change of Address
Foreword It wouldn’t be the first time on a penetration test (and cert...
Read More
The Perils of Password Reuse
In security, it’s often the simplest things that people neglect, and i...
Read More
Chaining for Critical: Unauthorized to Cloud Administrator
Introduction It is not uncommon on penetration tests to find misconfig...
Read More
Anatomy of an IoT Exploit, from Hands-On to RCE
Foreword This study concerns the firmware of the Wavlink Wireless-AC12...
Read More