SecureLayer7
1.6K posts

SecureLayer7
@SecureLayer7
Quick, reliable Pentest as a Service, API Security Scanning, and Offensive Security to uncover vulnerabilities and strengthen security posture
Austin, Tx 加入时间 Eylül 2014
20 关注2.5K 粉丝

We are going to discuss with Security Leader Shobit and @cure53berlin about the these issue:
us06web.zoom.us/webinar/regist…
English

Here are the TOP misreported findings you should never accept in a pentest report.
With us @cure53berlin, @SandeepL337, and Shobhit Mehta — let’s unpack such vulnerability which is not real.
Join this interesting firechat:
us06web.zoom.us/webinar/regist…

English

Join cybersecurity leaders for a fireside chat on spotting false positives in pentest reports, prioritizing real risks, and improving remediation workflows.
Who Should Attend: CISOs, Security leaders, pentesters, and security teams.
Register here - us06web.zoom.us/webinar/regist…
English

CVE-2025-25364: Speedify VPN MacOS privilege Escalation
blog.securelayer7.net/cve-2025-25364…
English

Windows Telephony Services: 2025 Patch Diffing & Analysis
blog.securelayer7.net/windows-teleph…
English

Updated: Top 2025 vulnerabilities you shouldn’t accept in a pentest report [DRAFT]
Introducing three different sections:
1. Minor Infrastructure Information Exposure
2. Reporting Unexploitable Vulnerabilities
3. Problems Without Security-Related Impact
github.com/securelayer7/n…
English

We’d love to hear additional contexts that don’t make sense in pentest report. Submit your pull requests or issues. We aim to finalize this draft by the 31st for practitioners and pentesters.
github.com/securelayer7/n…
SecureLayer7@SecureLayer7
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. github.com/securelayer7/n…
English
SecureLayer7 已转推

@0xTib3rius Valid point - context is critical. and updated with this details
Some browsers (Chrome) delay or throttle background requests in inactive tabs meaning keep-alive signals might not be sent on time. This could lead the session to persist longer than expected even with a timeout set
English

Some of these are good. Some are questionable.
There's a lot that really require context. For example, saying that long session timeouts "isn't a vulnerability; it's a design decision".
Well, it *can* be a design decision. What if it's not? What if the developer used a bad default value? Pentesters shouldn't make assumptions about these things. Customers are perfectly capable of accepting the risk of findings in a report.
SecureLayer7@SecureLayer7
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. github.com/securelayer7/n…
English

Metasploitable3 takes pentesting to the next level with new vulnerabilities and challenges.
blog.securelayer7.net/metasploitable…
English

The list is designed to be educational. We’ll update each point with detailed explanations of why it doesn’t matter and provide the context to support it.
SecureLayer7@SecureLayer7
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. github.com/securelayer7/n…
English

Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios.
github.com/securelayer7/n…
English

@albinowax You make a valid point! While a strict CSP can significantly reduce the risk of XSS, it isn't a foolproof solution. Especially with creative exploitation techniques like JSONP abuse, improperly sanitized data in inline event handlers, or compromised third-party scripts. REMOVED.
English

I have to disagree with this post's claim that you shouldn't report or patch "XSS vulnerabilities mitigated by strict CSP". Strict CSP configurations can get bypassed and HTML injection & style injection are both threats too! CSP is for defence in depth.
SecureLayer7@SecureLayer7
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. github.com/securelayer7/n…
English

We are expanding out project management team, adding more folks to manage the North American and Indian customer. Interested? Send us CV at job@securelayer7.net
English
SecureLayer7 已转推

PHP symlink exploit, anyone? 😅
Was checking PTaaS platform & saw one of our pentesters found an exploit allowing access to other tenants sensitive data on cloud hosting!
linkedin.com/feed/update/ur…
English

