Multiple Vulnerabilities in Vivotek Camera

Author: Mike Manzotti – Senior Consultant In a recent security engagement Vivotek Camera IT9388-HT (firmware version: 0100p) was found to be vulnerable to arbitrary file download (CVE-2020-11949) and remote command execution (CVE-2020-11950). Vivotek Camera...

A Brief Story of a Red Team Security Assessment Part 2

Author: Wesley Renshaw – Lead Consultant Part one looked at the objectives of the Red Team assessment, the team carried out reconnaissance and achieved an initial foothold into the client environment, where privileges were escalated to compromise the Asia...

A Brief Story of a Red Team Security Assessment Part 1

Author: Wesley Renshaw – Lead Consultant This two part blog series will take a look at a recent Red Team assessment performed by Dionach, and the process that was carried out to overcome barriers and achieve the objectives set out by the client. Introduction...

Introduction To Red Teaming

When a company is in the process of proactively improving security posture, there are various services and standards that comes into help. Performing a penetration test of a production website or a vulnerability assessment of the internal network are valid methods to...

Risk based Application Penetration Testing

It is generally accepted within the information security world that penetration testing is a good way to provide assurance as to the security of applications or infrastructures. With numerous companies offering these testing services, how do you differentiate and...