EvilQR Phishing / QRLJacking
QR codes are designed for usability, not security. Using QRLJacking, a victim can unknowingly grant access to their account by scanning a QR code.
KeePass Master Password Exploit - CVE-2023-32784 - Proof Of Concept (POC)
Another day, another CVE. It is possible to recover the master password in cleartext for KeePass. Write up, examples and a POC to demonstrate CVE-2023-32784
NoVNC and Browser In The Browser Phishing attack POC/Explained
Combining two advanced phishing techniques
Browser In The Browser (BITB) Attack - POC
Browser In The Browser (BITB) phishing attacks are less common but very effective when used. They’re hard to identify and easy to setup!
Microsoft 365 Security Hardening Guide
Office 365 is widely used however, is rarely configured to best practices which can allow a multitude of attacks/exploitation.
Use this security hardening guide.
My first BurpSuite Vulnerability using Intercept
My first time using BurpSuite Intercept and I found a vulnerability which allows me to change the price of items and checkout.
Force Outlook for Mobile via Conditional access
How to force mobile devices to use the Outlook App instead of their native apps.
How to check Shared mailbox’s Access Rights via Powershell
How to check Shared mailbox’s Access Rights via .csv with Powershell. Useful for checking permissions without having to go through the office.com admin/exchange interface.
How to check mailbox rules in O365
How to search the mailbox rules on your tenant per user, via Powershell. Great for finding what rules have been setup via the Client/Webapp.
How to check User and Shared Mailbox Forwards in O365
How to use powershell to search user mailbox and shared mailbox forwards within your tenant for security purposes.