Hack Responsibly

Browse Hack Responsibly, a technical blog by The NetSPI Agents. Dive deep into the latest CVEs and vulnerabilities our team uncovers, and how we help NetSPI customers protect against the most important threats today.

Web Application Pentesting

Walking Through an Attack Path with ForceHound

In Part 2 of the series, Weylon covers how to use ForceHound to visualize Salesforce attack paths in BloodHound CE, identify transitive privilege escalation, and legacy Connected App exposures.

Learn More
Web Application Pentesting

Auditing Salesforce Permission Hierarchies with ForceHound 

Discover how ForceHound automates the collection of profiles, permission sets, and connected apps to reveal the true trust boundaries of your Salesforce organization.

Learn More
Adversary Simulation

7 Ways to Execute Command on Azure Virtual Machines & Virtual Machine Scale Sets

Examples of different command execution paths for Azure Virtual Machines and Virtual Machine Scale Sets.

Learn More
Adversary Simulation

Pipe Dreams: Remote Code Execution via Quest Desktop Authority Named Pipe 

Discover the risks of the CVE-2025-67813 vulnerability in Quest Desktop Authority. Learn how this RCE flaw impacts your organization and how to mitigate it.

Learn More
Hardware Penetration Testing

Rust’s Role in Embedded Security 

Rust enhances memory safety in embedded systems, but rigorous security testing remains essential to address logic, hardware, and cryptographic vulnerabilities. Explore the benefits and key considerations of using Rust

Learn More
Cloud Pentesting

Decrypting VM Extension Settings with Azure WireServer

The Azure WireServer service provides configuration data to Azure Virtual Machines. Join us as we walkthrough the process of decrypting that data to find sensitive information.

Learn More
Cloud Pentesting

We Know What You Did (in Azure) Last Summer

At DEF CON 33, NetSPI presented a talk about how Azure resources supporting Entra ID authentication expose tenant IDs, enabling attackers to attribute cloud resources to specific organizations at scale.

Learn More
Cloud Pentesting

Automating Azure App Services Token Decryption

Discover how to decrypt Azure App Services authentication tokens automatically using MicroBurst’s tooling to extract encrypted tokens for security testing.

Learn More
Red Teaming

CVE-2025-4660: Forescout SecureConnector RCE 

Learn about the high-risk RCE vulnerability in Forescout SecureConnector allows attackers to turn security agents into C2 channels.

Learn More
Secure Code Review

Detecting Authorization Flaws in Java Spring via Source Code Review (SCR)

Discover how secure code review catches privilege escalation vulnerabilities in Java Spring apps that pentests miss – identify insecure patterns early.

Learn More
Network Pentesting

Set Sail: Remote Code Execution in SailPoint IQService via Default Encryption Key

NetSPI discovered a remote code execution vulnerability in SailPoint IQService using default encryption keys. Exploit details, discovery methods, and remediation guidance included.

Learn More
Cloud Pentesting

Extracting Sensitive Information from Azure Load Testing

Learn how Azure Load Testing’s JMeter JMX and Locust support enables code execution, metadata queries, reverse shells, and Key Vault secret extraction vulnerabilities.

Learn More