Topic: Attack and vulnerability research
Exploiting default cloud configurations for fun and profit
Don’t rely on the default configuration for cloud services. Accenture shows how an "out-of-the-box" AWS configuration might leave your resources unprotected.
Discovering and Exploiting Multiple Vulnerabilities in Avaya Aura
Accenture supports discovering and exploiting 0-day vulnerabilities in Avaya to breach the perimeter in an Adversary Simulation. Read more.
Red teaming Jenkins with the Jenkins Attack Framework
Accenture Jenkins Attack Framework (JAF) is an internally developed red teaming tool for interacting with Jenkins build servers. Read more.
The future of Bugtraq
In April 2020, Accenture acquired the Bugtraq mailing list to stabilize the platform and return it to healthy operations. Read how.
Discovering, exploiting and shutting down a dangerous Windows print spooler vulnerability
In May 2020, FusionX reported a vulnerability in the Windows Print Spooler service to the Microsoft Security Response Center. Read more.
CLRvoyance: Loading managed code into unmanaged processes
Accenture's blog explains CLRvoyance, a new tool for loading managed code or assemblies into unmanaged processes. Read more.
Subscribe to Accenture's Cyber defense blog Subscribe to Accenture's Cyber defense blog
Follow us: Follow us: