top of page
Search


Exploiting User Registration and Membership Logic for Privilege Escalation (CVE-2025-2563)
As defenders patch vulnerabilities in production environments, threat actors continually adapt to exploit new weaknesses, sometimes for financial gain and sometimes to disrupt operations. In this blog, we'll explore how attackers can escalate privileges via a web GUI and ultimately obtain shell access by exploiting a recently disclosed WordPress vulnerability, CVE-2025-2563 . We'll walk through the attack chain from an attacker’s perspective against a practice (non-production
Daniel Vazquez
Nov 45 min read


Automated vs Manual Pentesting
With automation and Artificial Intelligence (AI) on the rise, it's becoming increasingly important to adapt to the tools and techniques...
Aaron Henderson
Aug 263 min read


Protecting Your Family and Personal Information
Personally Identifiable Information or PII is any information about a specific person that can be used to discover that person’s identity.
Pete Ningcharoen
Sep 4, 20244 min read


Celebrating Women in Cybersecurity
Polito would like to share resources aimed at women who are in cybersecurity or who are interested in getting into this amazing field.

Esther Matut
Mar 29, 20241 min read


How to Build Your Own DNS Sinkhole and DNS Logs Monitoring System
Pi-hole logs each DNS event, including domain resolutions and blocks. DNS logs are a gold mine that is often overlooked by network defenders
Ronny Thammasathiti & James Kelly
Oct 26, 202312 min read


Introduction to Proving Grounds
The Proving-Grounds offers both free and paid tier levels, where users can test their skills in a lab environment similar to other platforms

Esther Matut
Aug 16, 20238 min read


Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Erica Zelickowski
Jul 25, 20235 min read


LDAP Queries for Offensive and Defensive Operations
The intention of this post is to provide basic queries for targeted AD DS information gathering used in penetration testing. The reader can
Erica Zelickowski
Jul 5, 20236 min read


Why Cybersecurity Needs a Leader - CISO
A Chief Information Security Officer (CISO) might be what these organizations are missing.
Frank Siepmann
Apr 11, 20234 min read


Malicious eFax Attachments Can Potentially Steal Your Microsoft O365 Password
Phishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.
Nickolas Baker
Mar 16, 20233 min read


Enhancing Digital Forensics with X-Ways X-Tensions: VirusTotal Plugin
Polito is pleased to release our VirusTotal extension for X-Ways. This open source extension is useful to quickly triage file hashes
Fred Mastrippolito
Feb 1, 20233 min read


Virginia CyberSlam 2023 - Supporting The Next Generation of Cybersecurity Experts
Polito, Inc. is proud to be a sponsor for the 2023 Virginia CyberSlam event being held at George Mason University today. This event brings t
Peter Quach
Jan 9, 20231 min read


Beginner Social Media OSINT/Reconnaissance
OSINT, or Open-source Intelligence, are a set of techniques for data collection and analysis that is publicly available from various sources

Esther Matut
Dec 14, 20228 min read


5 Cybersecurity Lessons From the Ukraine War
Best practices guidelines allow organizations to respond to five lessons learned from the Ukraine war
Mattia Campagnano
Jun 16, 20226 min read


Wicked6 US Cyber Range CTF: Ladies of Space Cows
On March 23rd and 24th, 2022, Wicked6, sponsored by many companies produced a special 24 hour global women's only CTF event virtually.

Esther Matut
Mar 29, 20228 min read


Introducing Hash Exporter for X-Ways: Automate Your Hash Lists
Polito Inc. is pleased to announce that we are releasing the Hash Exporter extension for X-Ways. Hash Exporter helps automate hash extract
Fred Mastrippolito
Jan 31, 20222 min read


Return to Libc: Linux Exploit Development
This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
Nihaal Prasad
Oct 5, 20216 min read


How to go Phishing with Gophish
How to conduct basic phishing campaigns using Gophish, an open-source tool for testing an organization’s vulnerability to phishing.
Nihaal Prasad
Aug 10, 20217 min read


Top 3 Reasons Why Organizations Should Get a Penetration Test Today
Cybersecurity breaches and other incidents have become increasingly frequent and more impactful over the last year. In a recent high-profile
Mattia Campagnano
Feb 23, 20214 min read


Masterful Policies and Compliance: Industries, Policies, Regulations, and How to Get Started
Policy assessments should be considered as a cybersecurity best practice and should be conducted annually with other assessments such as vul
Liana Parakesyan
Nov 4, 20206 min read
bottom of page
