Retrieving Data from Thunderbird and Firefox

Reading data from Mozilla products such as Thunderbird and Firefox has never been much of a challenge during engagements. Like many Windows applications, they both use SQLite databases to store their information – and unlike other “similar” products e.g. Google Chrome, these databases aren’t encrypted and can easily be read once they’ve been exfiltrated from…

A Data Hunting Overview

Background: Getting domain admin access is hardly ever the goal of penetration tests/red team assessments, unless it’s explicitly stated by the client of course. That said, having DA access in a target’s domain makes it a lot easier to take action on your actual objectives; which is why a lot of us will prioritise acquiring…

AIX for Penetration Testers

Background: On a recent internal pentesting engagement I managed to get an unprivileged shell on one of my client’s servers. It was a business critical server so enumerating it and rooting it was the next logical move to make. I always begin my enumeration by running the “uname -a” command to get some basic system…