Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Exploitation of Vulnerabilities
The aim of this research is to uncover the vulnerabilities of the keyless smart cars as well as to hack and exploit them through the technologies like software defined radio (SDR) and devices GNURadio and HackRF.
Learn more
Yash Kenia
Android Vulnerabilities and Exploits
This blog continues Part I of the android exploitation experiment. We build a proof-of-concept code with an Android NDK. UAF vulnerability (CVE-2019-2215)
Batuhan Irmak
This blog post will trigger a UAF vulnerability (CVE-2019-2215) in Binder from scratch. After preparing the necessary environment and tools, we will reach the KASAN output with the POC exploit.
Reverse Engineering
What is responsible disclosure? In this article, VerSprite will outline a typical process for zero-day vulnerability reporting, the ethics behind hacking, and provide real-world examples of our responsible disclosures.
VerSprite
Pen Testing
Embedded Device security is increasingly more important to discuss as more everyday and critical medical devices are equipped with them. Learn from our IoT security experts how embedded device security testing can reduce common local & remote attack surfaces.
Robert Hawes
Attack Surface
Utilizing reverse proxies offers a more advanced approach for creating phishing web pages that not only allow the Victim User to fully authenticate to their account through a malicious site, but also how to automate the theft of information within the account.
James Sibley
Exploit Development
When performing vulnerability research, it is essential to make sure that all attack vectors concerning exploitation are exhausted. One avenue of exploitation comes from the Windows registry.
Microsoft published an advisory on a critical vulnerability found in the Microsoft Outlook Android application. The attack happens when an email is sent to the victim with an embedded hidden code.
Jason Bell
In this blog, we’ll be discussing the discovery, analysis, and exploitation of CVE-2019-8917 which is a remotely exploitable WCF vulnerability that we discovered in SolarWinds Orion NPM 12.3.
Fabius Watson
Back to Resources
We are an international squad of professionals working as one.
Email
Phone