Advertisement ยท 728 ร— 90

Posts by Volkis

Post image

๐Ÿงช Volkis Lab: Privilege Escalationย ย 

You donโ€™t need exploits when the system hands you the right tool.

๐Ÿบ Can you spot it?

1 day ago 0 0 0 0
Post image

Another happy customer review came through today. ๐Ÿ˜Š

1 week ago 0 0 0 0

2 fake resumรฉ's and very awkward job interviews later, we captured an auth attempt on our evil twin that gained us a foothold into their enterprise network, we also dropped a Raspberry Pi on an ethernet port on the way out!

We didn't get the job ๐Ÿ˜ž, but we got domain admin ๐Ÿ˜.

#HackingStories ๐Ÿบ

3 weeks ago 1 0 0 0

We signed in and sat down, waiting to be called. Everyone believed we were just there for the job. Partly true, since we were doing our job.

3 weeks ago 0 0 1 0

Two of us polished up our (completely fabricated) resumรฉ's and scored an interview! Everything was going to plan. We turned up for our interview on the day with a laptop in our backpack, running an evil twin attack on their WPA2-Enterprise network.

3 weeks ago 0 0 1 0

Through our OSINT, we noticed that they were hiring a bookkeeper for their finance team. We figured the interviews would be held at the office. That was our in.

3 weeks ago 0 0 1 0

In a recent red team engagement, we needed to get close to the target office, which was on the 15th floor of a skyscraper. It was too difficult to get to the elevators without having an ID badge, so we thought about good excuses to have them let us in.

3 weeks ago 0 0 1 0

We don't need to hack code to change how apps behaves. We just feed the AI a hidden command and let it summarise our resume in a favourable light. ๐Ÿบ

#VolkisExplains

1 month ago 0 0 0 0

๐Ÿบ A hidden "Ignore all previous instructions" line in a resume.

๐Ÿบ Malicious prompts in website metadata to redirect output.

๐Ÿบ "Jailbreaks" that trick models into revealing system prompts.

1 month ago 0 0 1 0
Video

It is common to think an AI agent is safe because it only handles "public" data.

But the most dangerous instructions aren't written by developers.

They are the "Injected" commands ๐Ÿ‘‡

1 month ago 1 0 1 0
Advertisement

We browsed to the M365 admin panel and yep, Global Admin privilege.

The password vault icon was also on the desktop. Double-click, punch in creds, straight in! The passwords to all their SaaS platforms were right there.

Sometimes it pays to work late. ๐Ÿบ

#HackingStories

1 month ago 2 0 1 0
Post image

We did this pentest recently where we got Domain Admin. Cool, but we wanted more! We had the admin's creds so we just waited...

When the admin logged out and left for the day, we just logged back in through RDP as him! ๐Ÿ‘‡

1 month ago 0 0 1 0
Post image

๐Ÿงช Volkis Lab: This seems suspicious, doesn't it?

Sleep โ†’ Decode โ†’ Decrypt โ†’ Runtime API resolution โ†’ explorer.exe

๐Ÿบ Name the technique.

Drop the ATT&CK ID if you know it.๐Ÿ‘‡

1 month ago 0 0 0 0

But instead of try multiple account against one account, we try a few passwords against ALL accounts. That's how password spraying works.

It's okay! Go change your password if you need to. ๐Ÿ™‚๐Ÿบ

#VolkExplains

1 month ago 1 0 0 0
Post image

Does guessing or brute-forcing passwords still work? Yep!

CompanyName123, Monday2026!, Commodore#1... We still see these, and it's often our foothold into a network. ๐Ÿ‘‡

1 month ago 1 0 1 0
Post image

Hackers donโ€™t need fancy tooling anymore, the target system carries it for us.

We can "live off the land".
Your PowerShell. Your MSHTA. Your CERTUTIL.

Your tools, our commands.

#HackingTips

1 month ago 0 0 0 0
Post image

๐Ÿงช Volkis Lab: Can you recognise it?

Bonus: Drop the MITRE ATT&CK ID ๐Ÿ‘‡๐Ÿบ

1 month ago 0 0 0 0
Video

Pumping yourself up to write a pentest report on a Friday afternoon ๐Ÿ“ข ๐ŸŽต๐Ÿ•บ

1 month ago 1 0 0 0
Advertisement
Post image

๐Ÿงช Volkis Lab: Got a reverse shell?

Donโ€™t rush into recon or privilege escalation.ย ย 
Raw, fragile access gets you caught.

Stabilise it first.ย 
Control before capability.

Drop your thoughts ๐Ÿ‘‡๐Ÿบ

1 month ago 0 0 0 0

We were able to take full DNS control of *.staff[.]example[.]com, and create our own user@staff[.]example[.]com email addresses.

That made our phishing engagements a piece of cake!

#VolkExplains ๐Ÿบ

1 month ago 1 0 0 0

We looked back through the DNS resolutions in our recon data and noticed that the staff.example[.]com subdomain was returning "REFUSED".

The DNS was also being handled by a cloud DNS provider that is vulnerable to DNS takeovers.

1 month ago 0 0 1 0
Post image

We were on a red team engagement searching through the external infrastructure for a way in.ย 

Struggling for a way in, a junior asked: "What about DNS?"

That comment made us zoom out a notch.๐Ÿ‘‡

1 month ago 0 0 1 0
SECURITY DOESN'T MATTER (if the business fails)
SECURITY DOESN'T MATTER (if the business fails) Security doesnโ€™t matter if the business CAN'T afford it. Thoughts?

Throughout many years in cybersecurity, we've learned a hard lesson.

Cybersecurity is not the most important thing.

Let me explain ๐Ÿ‘‡

2 months ago 0 0 0 0

๐Ÿบ Forgotten project staging
๐Ÿบ Forgotten IPs
๐Ÿบ Active hosts that are no longer monitored

This is where we usually find the vulns!

#VolkExplains

2 months ago 0 0 0 0
Post image

Itโ€™s common to enumerate your attack surface using DNS records. But the weakest systems usually arenโ€™t in DNS.

They are the ones that have drifted: ๐Ÿ‘‡

2 months ago 1 0 1 0
Post image

๐Ÿงช Volkis Lab: What attack would you do and what tool(s) would you use?

The scan is telling you everything if you know how to read it.

Drop your answers below ๐Ÿ‘‡๐Ÿบ

2 months ago 0 0 0 0
Advertisement

Simple steps:

1. Win + R.
2. Ctrl + V.
3. Enter.

Nothing felt risky, so they followed along without thinking.

Nothing crashed or popped. Just like that, we got in

#HackingStories #VolkExplains

2 months ago 0 0 0 0
Post image

The company rolled out a new webpage. It looked normal. Just another page asking you to โ€œverify youโ€™re human.โ€

It was a ClickFix attack. ๐Ÿ‘‡

2 months ago 1 0 1 0

- AD User Object
- Printer
- Cert Template

โ˜๏ธ Some of the most frustrating examples.

Sometimes the best defence is letting the attacker believe they succeeded. ๐Ÿบ

#VolkExplains

2 months ago 0 0 0 0
Post image

Nothing annoys us, as attackers, more than well placed honeypots/tokens. It makes us paranoid at every step.

That's good! ๐Ÿ‘‡

2 months ago 0 0 1 0