cornerpirate.com Open in urlscan Pro
192.0.78.24  Public Scan

Submitted URL: https://www.cornerpirate.com/
Effective URL: https://cornerpirate.com/
Submission: On April 06 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://subscribe.wordpress.com

<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
  <div class="actnbr-follow-count">Join 29 other followers</div>
  <div>
    <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
  </div>
  <input type="hidden" name="action" value="subscribe">
  <input type="hidden" name="blog_id" value="46366929">
  <input type="hidden" name="source" value="https://cornerpirate.com/">
  <input type="hidden" name="sub-type" value="actionbar-follow">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="acf6bf0da6">
  <div class="actnbr-button-wrap">
    <button type="submit" value="Sign me up"> Sign me up </button>
  </div>
</form>

Text Content

Skip to content
Close collapsed
 * Home
 * Non-Infosec
 * Videos
 * Word Tips
 * About

Menu expanded



INFOSEC

My adventures in infosec. Pentesting, red teaming and the rest of it.


BEATING A MASTER LOCK (KEY BOX)

I moved house a while back and the place came with one of those Air BnB style
key boxes on the front made by Master Lock. There was nothing in the handover
about it and it was likely that it had belonged to the previous previous owners
as it looked unloved for a long time.…More

Keep reading
March 31, 2022March 31, 2022


FINDING MISSING PATCHES THE HARD WAY

In this post I present a short piece of PowerShell that helped me find missing
patches in a .net application. The target was a thick client where source code
was not provided. Almost everything has outdated dependencies and the goal for
me is to see if any of them will provide an obvious way to…More

Keep reading
October 13, 2021


JAVA GIVING MORE SHELLS ON EVERYTHING

Back in 2018 I blogged about how java gives a shell for everything, and also how
to compile in memory as an AV Evasion technique. Some of these techniques have
now been added into gtfo bins, and heroes even integrated them into metasploit.
In this post I go through the most recent JDK/JRE and look…More

Keep reading
August 6, 2021August 9, 2021


GRABBING NTLM HASHES WITH RESPONDER THEN WHAT?

Local networks have lots of things on them that we as penetration testers can
exploit. In a Windows environment there are often protocols (LLMNR and NBT-NS)
which can be easily exploitable. Effectively you are running a man in the middle
attack and using that to intercept traffic being sent by users in order to
capture…More

Keep reading
June 17, 2021August 7, 2021


XSS VIA HTML5 EVENTS ALL OVER AGAIN

Back in 2018 I wrote a post about finding and exploiting XSS using the new(ish)
event handlers in HTML 5. Those techniques paid out recently and I thought I’d
write up the situation. Using the lists provided in the earlier post I
discovered the application allowed an “SVG” tag. Within that tag it allowed
the…More

Keep reading
May 23, 2021August 8, 2021
Load more posts

Loading…

Something went wrong. Please refresh the page and/or try again.


SHARE THIS:

 * 
 * 
 * 


LIKE THIS:

Like Loading...
Blog at WordPress.com.

 * Follow Following
    * cornerpirate.com
      Join 29 other followers
      
      Sign me up
    * Already have a WordPress.com account? Log in now.

 *  * cornerpirate.com
    * Customize
    * Follow Following
    * Sign up
    * Log in
    * Copy shortlink
    * Report this content
    * View post in Reader
    * Manage subscriptions
    * Collapse this bar


%d bloggers like this: