Exploiting Sandboxes

Exploiting Sandboxes


What if one could do more than just bypass a sandbox (easy), but actually exploit the sandbox to gain access to custom signatures, client lists, and other customers’ files? It may be easier than you think. Here’s details showing how we exploited some of the leading sandboxes in the industry.

(more…)

Exposing Tanium: A Hacker’s Paradise

Exposing Tanium: A Hacker’s Paradise


Tanium has gained much popularity the past few years. Those jumping on the Tanium train need to beware. If your company uses Tanium, your data is at high risk, IMO. Their “peer chain” model, and the lack of encryption of that data, is unsecure and should not be trusted.

(more…)

© PEN Consultants, LLC 2013 -