Sven Schlüter
@secsven
Advanced Attack Simulation Specialist @ysecurityde - running all sorts of adversary emulations & pentests.
chaos.social/@secsven
ID: 17776998
https://www.y-security.de 01-12-2008 11:36:48
783 Tweet
504 Followers
506 Following
Great experience using and abusing Hack The Box Blizzard Lab. #htb #oldmanyellingatcloud #blizzard #blacksky
Have you ever wondered how to start #AWS penetration testing? We have published AWS penetration testing: A step-by-step guide at the Hack The Box website: hackthebox.com/blog/aws-pente… #HTB #BugBounty #Y #Security #Cloud
We started to play with censorship circumventions. Of course, we exploit our TLS skills to bypass big firewalls. In our first work, Niklas Niere/JonSnowWhite shows that TLS record fragmentation is a useful technique to bypass the Great Firewall of China (GFW). upb-syssec.github.io/blog/2023/reco…
Our security team at Y-Security has identified a vulnerability in AXESS Auto Configuration Server (CVE-2024-56316) which allows unauthenticated remote attackers to trigger a permanent DoS. Advisory + Mitigation: y-security.de/news-de/axess-… #YSecurity #CVE202456316 #TR069 #ACS
Our security team at Y-Security has identified multiple vulnerabilities in TIM BPM Suite/TIM FLOW, allowing authorization bypass, privilege escalation, and SQL/HQL injection. Advisory + Mitigation: y-security.de/news-en/tim-bp…