Silent Signal

  • About us
  • Services
  • Products
  • Events
  • References
  • Contact
  • IBM i
  • magyar változat
  • Techblog

    2025.01.21

    Vulnerability Archeology: Stealing Passwords with IBM i Access Client Solutions

    link
  • Techblog

    2025.01.14

    Story of a Pentester Recruitment 2025

    link
  • Techblog

    2024.12.06

    Handling Arbitrarily Nested Structures with Burp Suite

    link
  • Techblog

    2024.10.27

    Engineering WCF Hacks

    link
  • RECon 2024

    2024.06.29

    Control Flow Integrity on IBM i

    link smart_display picture_as_pdf
  • TROOPERS 2024

    2024.06.26

    IBM i for Wintel Hackers

    smart_display picture_as_pdf
  • Webinar

    2023.10.26

    Hackers' Perspective: Demystifying IBM i System Security

    link smart_display
  • Techblog

    2023.08.22

    Technical Details of CVE-2023-30988 - IBM Facsimile Support Privilege Escalation

    link
  • Techblog

    2023.07.03

    Technical Details of CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service

    link
  • Techblog

    2023.03.30

    Booby Trapping IBM i

    link
  • Techblog

    2023.01.20

    Abusing Adopted Authority on IBM i

    link
  • ISACA Industry news

    2022.10.24

    Taking a Risk-Based Approach to Pen Testing

    link
  • Techblog

    2022.10.18

    Our new scanner for Text4Shell

    link
  • Techblog

    2022.09.28

    Another Tale of IBM i (AS/400) Hacking

    link
  • Techblog

    2022.09.05

    Simple IBM i (AS/400) hacking

    link
  • Camp++ 0x7e6

    2022.07.02

    That JWT talk - JSON Web Tokens considered harmful

    link smart_display picture_as_pdf
  • OffensiveCon 2022

    2022.02.05

    Case Studies of Fuzzing with Xen

    link smart_display picture_as_pdf
  • Techblog

    2021.12.12

    Our new tool for enumerating hidden Log4Shell-affected hosts

    link
  • Techblog

    2021.10.14

    Fuzzy Snapshots of Firefox IPC

    link
  • Camp++ 0x7e5

    2021.08.26

    Building a DIY zero-trust SSH CA - Managing SSH access in a secure and transparent manner without bloat

    link smart_display picture_as_pdf
  • Techblog

    2021.04.06

    Adding XCOFF Support to Ghidra with Kaitai Struct

    link
  • Techblog

    2021.02.08

    Abusing JWT public keys without the public key

    link
  • Camp++ 0x7e4

    2020.08.22

    Climbing the SPHINX - the journey of porting it to Android and the detours of fixing design vulnerabilities

    link smart_display picture_as_pdf
  • Techblog

    2020.08.17

    Unexpected Deserialization pt.1 - JMS

    link
  • Techblog

    2020.05.20

    Tips and scripts for reconnaissance and scanning

    link
  • Techblog

    2020.05.04

    Decrypting and analyzing HTTPS traffic without MITM

    link
  • Gold Paper

    2020.04.20

    Uninitialized Memory Disclosures in Web Applications

    link
  • Gold Paper

    2020.02.25

    Unix-style approach to web application testing

    link
  • Techblog

    2020.01.27

    Wide open banking: PSD2 and us

    link
  • Techblog

    2019.10.21

    Patching Android apps: what could possibly go wrong

    link
  • Camp++ 0x7e3

    2019.07.26

    Unix vs web pentesting - combining small building blocks with pipes can be beneficial for web pentesters

    link smart_display picture_as_pdf
  • Techblog

    2019.07.02

    Evading Cisco AnyConnect blocking LAN connections

    link
  • Techblog

    2019.06.24

    Self-defenseless - Exploring Kaspersky’s local attack surface

    link
  • Techblog

    2019.05.10

    Decrypting Eazfuscator.NET encrypted symbol names

    link
  • Research & development

    2019.04.25

    We developed a test environment for libvips entropy calculation (CVE-2019-6976)

    link
  • Techblog

    2019.04.18

    Drop-by-Drop: Bleeding through libvips

    link
  • Techblog

    2019.04.04

    Our take on social engineering

    link
  • Camp++ 0x7e2

    2018.08.07

    High-performance web application fingerprinting based on SCM repositories

    link smart_display picture_as_pdf
  • Techblog

    2018.05.22

    The curious case of encrypted URL parameters

    link
  • Techblog

    2018.02.02

    Snow cannon vs. unique snowflakes — testing registration forms

    link
  • SecOps Europe

    2018.01.24

    High-performance web application fingerprinting based on SCM repositories

    picture_as_pdf
  • Research

    2018.01.08

    Bare Knuckled Antivirus Breaking

    link picture_as_pdf
  • Techblog

    2017.12.21

    Emulating custom crytography with ripr

    link
  • Techblog

    2017.12.05

    Conditional DDE

    link
  • BSidesVienna

    2017.11.18

    High-performance web application fingerprinting based on SCM repositories

    picture_as_pdf
  • Hacktivity

    2017.10.20

    Corrupting Ancient Spirits - Penetration Testing Oracle Forms

    link smart_display picture_as_pdf
  • Techblog

    2017.08.14

    Notes on McAfee Security Scan Plus RCE (CVE-2017-3897)

    link
  • Camp++ 0x7e1

    2017.07.07

    Keys to the kingdom

    link smart_display picture_as_pdf
  • Techblog

    2017.05.08

    Fools of Golden Gate

    link
  • HEK.SI (Slovenia)

    2017.04.06

    Make It Count – Progressing through Pentesting

    link picture_as_pdf
  • Techblog

    2017.02.17

    Not so unique snowflakes

    link
  • Techblog

    2017.01.03

    Beyond detection: exploiting blind SQL injections with Burp Collaborator

    link
  • Techblog

    2016.11.28

    An update on MD5 poisoning

    link
  • Techblog

    2016.08.25

    Bake your own EXTRABACON

    link
  • We were the first to publicly port EXTRABACON to Cisco ASA version 9.2(4)

    2016.08.23

    After sharing a screenshot on Twitter we got coverage from Ars Technica, SecurityWeek, Threatpost and several others.

    smart_display
  • Camp++ 0x7e0

    2016.08.18

    Testing stateful web application workflows

    link smart_display picture_as_pdf
  • Techblog

    2016.06.16

    Accessing local variables in ProGuarded Android apps

    link
  • Techblog

    2016.05.13

    Detecting ImageTragick with Burp Suite Pro

    link
  • Techblog

    2016.05.06

    iOS HTTP cache analysis for abusing APIs and forensics

    link
  • Research & development

    2016.03.11

    We developed a Burp Suite Pro plugin to detect JSON array issues

    link
  • Techblog

    2016.02.10

    You’re not looking at the big picture

    link
  • Gold Paper

    2016.01.14

    Testing stateful web application workflows

    link
  • Gold Paper

    2015.12.28

    Burp Suite(up) with fancy scanning mechanisms

    link
  • Techblog

    2015.10.02

    Proxying nonstandard HTTPS traffic

    link
  • Techblog

    2015.09.17

    Finding the salt with SQL inception

    link
  • BlackHat USA

    2015.08.05

    We organized the wargame eCSI hacker playground with BalaBit.

    link
  • Techblog

    2015.06.19

    Virtual Bank Robbery - In Real Life

    link
  • Techblog

    2015.06.10

    Poisonous MD5 - Wolves Among the Sheep

    link
  • Gold Paper

    2015.05.27

    Automated Security Testing of Oracle Forms Applications

    link
  • Ethical Hacking conference

    2015.05.08

    There’s worse than SSL — it’s hard to get a homebrew protocol right

    picture_as_pdf
  • CVE-2014-3440

    2015.05.07

    Symantec Critical System Protection RCE (vendor advisory and our blogpost)

    link
  • Techblog

    2015.04.03

    The story of a pentester recruitment

    link
  • Gold Paper

    2015.01.12

    AIX for Penetration Testers

    link
  • Techblog

    2015.01.06

    Code Review on the Cheap

    link
  • Techblog

    2014.10.03

    WebLogic undocumented hacking

    link
  • Techblog

    2014.07.28

    How to get root access on FireEye OS

    link
  • FireEye Operating System (FEOS) Command Injection Vulnerability

    2014.07.08

    We discovered a vulnerability that was fixed in FireEye OS 7.1.

    picture_as_pdf
  • Techblog

    2014.06.25

    HP-UX 0day local privilege escalation

    link
  • Techblog

    2014.06.06

    Trend Micro OfficeScan - A chain of bugs

    link
  • Techblog

    2014.04.17

    ISAKMP hacking - How much should we trust our tools?

    link
  • Techblog

    2014.04.04

    Quick and dirty Android binary XML edits

    link
  • Techblog

    2014.03.31

    OWASP Top 10 is overrated

    link
  • Techblog

    2014.03.14

    SNMP trap?

    link
  • Techblog

    2014.03.07

    Sanitizing input with regex considered harmful

    link
  • Techblog

    2014.02.27

    From Read to Domain Admin - Abusing Symantec Backup Exec with Frida

    link
  • Techblog

    2014.02.20

    Testing websites using ASP.NET Forms Authentication with Burp Suite

    link
  • Techblog

    2014.02.09

    JDB tricks to hack Java Debug Wire

    link
  • Techblog

    2014.01.31

    Compressed file upload and command execution

    link
  • Techblog

    2014.01.23

    Banging 3G rocks

    link
  • Techblog

    2014.01.13

    How did I find the Apple Remote Desktop bug? - CVE-2013-5135

    link
  • Techblog

    2014.01.10

    Duncan - Expensive injections

    link
  • Techblog

    2014.01.06

    WAF bypass made easy

    link
  • Techblog

    2013.12.17

    Plesk panel decryption

    link
  • Silent Signal techblog

    2013.12.05

    Silent Signal has launched its techblog

    link
  • Apple Remote Desktop Format String Vulnerability

    2013.10.24

    We discovered CVE-2013-5135 that was fixed in Apple Remote Desktop 3.7.

    link
  • Hacktivity 2013

    2013.10.11

    Heureka - The suspicious thing is that it's not suspicious

    link smart_display
  • CampZer0

    2013.09.28

    Abusing the IPC of Android apps for fun and profit

    smart_display picture_as_pdf
  • Oracle Web Determinations XML injection

    2013.07.22

    Details of a vulnerability fixed by Oracle in the July 2013. Critical Patch Update.

    link
  • Ghost in the Shell Control Box

    2013.05.29

    Walkthrough of the wargame we created together with BalaBit IT-Security

    smart_display
  • Ethical Hacking conference

    2013.05.09

    Antivirus out of the blue - Shady sides of CloudAV

    link
  • Paper

    2013.02.20

    From write to root on AIX

    picture_as_pdf
  • Hacktivity 2012

    2012.10.13

    USB = Universal Security Bug?

    link smart_display picture_as_pdf
  • Budapest Conference on Cyberspace

    2012.10.04

    Child soldiers of the modern age (előadás), Children on the internet (workshop)

  • SYM12-006

    2012.05.17

    We reported security issues in Symantec Web Gateway via Beyond Security SSD

    link
  • Professional qualifications

    2012.02.06

    Since February 6, 2012, all our penetration testers have GIAC Web Application Penetration Tester qualification, in addition to Offensive Security Certified Professional certification they already had.

  • Hacktivity 2011

    2011.09.17

    Hardware hacking for fun and profit

    picture_as_pdf
  • Budapest New Tech Meetup

    2011.09.07

    XSS 2.0

    smart_display
  • AID-070611

    2011.07.07

    Aruba Networks fixed a Cross Site Scripting vulnerability we discovered in ArubaOS and AirWave Administration Web Interfaces

    link smart_display
  • Paper

    2011.07.02

    Story of a Client-Side Attack

    picture_as_pdf
  • CVE-2010-4323

    2011.02.11

    ZCM TFTPD Remote Code Execution Security Vulnerability

    link
  • Professional qualifications

    2011.01.19

    Since January 19, 2001, all our penetration testers are Offensive Security Certified Professionals

  • CVE-2011-0264

    2011.01.10

    Stack-based buffer overflow in ovutil.dll in HP OpenView Network Node Manager

    link
  • CVE-2011-0263

    2011.01.10

    HP OpenView Network Node Manager ovas.exe Remote Code Execution Vulnerability

    link
  • CVE-2010-4113

    2010.12.15

    Hewlett-Packard Power Manager Administration Web Server Remote Code Execution Vulnerability

    link
  • Hacktivity 2010 Capture-the-Flag

    2010.12.03

    Solution of the Capture-the-Flag game we made

    smart_display
  • Hacktivity 2010

    2010.09.18

    “I run a Linux server, so we're secure” (talk), Metasploit Workshop, Buffer Overflow Workshop

    smart_display picture_as_pdf
  • Offensive-Security “How Strong is Your Fu? for Charity”

    2010.06.19

    Our team finished 5th on the competition of 102 contestants organized by Offensive Security

  • Offensive-Security “How Strong is Your Fu?”

    2010.05.08

    Our team finished 3rd on the competition of more than 1000 contestants organized by Offensive Security

  • Ethical Hacking conference

    2009.10.11

    Surviving the theatre of war on the web

    picture_as_pdf
Silent Signal
Twitter GitHub Blog Facebook LinkedIn
  • SILENT SIGNAL KFT.
  • VAT number: HU14907560
  • Address: 3-5. Vármegye str. H-1052 Budapest, Hungary
  • Email: info@silentsignal.hu
  • Information security department, trainings, gamification
  •  - Tel: +36 (30) 430 4567
  • Ethical hacking department
  •  - Tel: +36 (30) 542 4289
  • About us
  • Services
  • Products
  • Events
  • References
  • Contact
  • IBM i