• R+D
    Always at the forefront..
    More info

R+D

Our work in information security has been internationally recognized for more than 20 years.

Demystifying Qubes OS Security Pentest, by Hugo Vazquez Carames
Holes found in SonicWall god box itnews by Darren Pauly
Check Point FireWall-1 SDSUtil buffer overflow IBM Internet Security Systems
CheckPoint Secure Platform Hack by Hugo Vázquez Caramés
Check Point plays down FireWall-1 bug reports The Register, by John Leyden
Holes in Firewall-1 Linux Magazine, by Jan Rähm
ELECTRONIC BANKING, June 2006, nº97 Electronic Bank Magazine
Hacking against the clock Association of Internet Users
A DoS breaks Bluetooth punto-informatico.it
USN-145-1: wget vulnerabilities Ubunto Security Notices
How Hackers Think Bruce Schneier
VeriSign security seal could be forged delitosinformaticos.com
Not only a XSS FIST Conference
$1m hacking challenge' product is flawed The Register, by John Leyden
Web Site Welcomes Hackers PCWorld, by John Blau
Infohacking.com welcomes hackers InfoWorld by John Blau

Infohacking.com welcomes hackers

“Security experts issue challenge to deface Web site on production server running Windows 2000”... Read More

Spanish Intelligence 2010 Collaborating Companies

“List of collaborating companies of the National Cryptological Center, March 2010.”... Read More

esCERT certifies a Pentest report on attacks on online banking

“Evidence of certification by esCERT of our report on new attacks on electronic banking (bypass of coordinate cards with virtual keyboards)”... Read More

Anonymity and traceability in cyberspace

“Technical report is based on a dissertation submitted August 2005 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Darwin College”... Read More

IOS HTTP Server Command Injection Vulnerability

“Remote vulnerability in the IOS HTTP server allows full compromise”... Read More

Microsoft Internet Information Services (IIS) 6.0, vulnerable to ILLC attack

“Microsoft Internet Information Services (IIS) 6.0, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response.”... Read More

Argus Systems Channel Partners

“Pentest pioneers in Spain in MLS (Multi Level Security) systems and the first to be certified in the system used by the US DoD.”... Read More

Sun ONE (aka iPlanet) Web Server 4.1 and 6.0 vulnerable to ILLC attack

“Sun ONE (aka iPlanet) Web Server 4.1 through SP12 and 6.0 through SP5, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files, and conduct cross-site scripting (XSS) attacks.”... Read More

Electronic Banking: new attack vectors

“This report, prepared by Hugo Vázquez Caramés, from Pentest, presents a profile of the results obtained in the study of the security mechanisms used by banks.”... Read More

Hacking against the clock

“Computer security is a relatively recent specialty of Telematics. In 1988 Robert T. Morris released a worm that almost completely paralyzed the Internet.”... Read More

Spanish Intelligence 2017 Collaborating Companies

“List of collaborating companies of the National Cryptological Center, June 2017.”... Read More

CheckPoint Secure Platform Hack

“An uncensored real-time how was exploited a vulnerability in a kernel hardened EAL4+ certified firewall”... Read More

Cisco and Checkpoint facing firewall vulnerabilities

“Using the vulnerability found by Hugo Vázquez Caramés from Grupo ADD, it seems to be possible to have the firewall beiing not responding anymore to certain remote services among wich the famous SecuRemote.”... Read More

El Proxy-cache de Telefónica permite robar datos de usuarios

“A vulnerability in the 'Inktomi Traffic-Server' software has been recently discovered by two Spanish researchers, Hugo Vazquez Carames and Toni Cortes Martinez”... Read More

iPlanet Log Viewing Utility Concealed Log Entry Vulnerability

“A vulnerability has been reported for iPlanet 6.0 which may conceal malicious log entries”... Read More

Web Site Welcomes Hackers

“Two Spanish security experts are inviting computer buffs to participate in a competition to deface a Web site on a production server”... Read More

Root Command Injection in Azure Virtual Machines CRM:0461058838

“Root Command Injection in Azure Virtual Machines”... Read More

Emerging XSS Vulnerabilities in html Log Viewers

“Firewall, IDS and E-Mail XSS - Implications beyond Webservers ”... Read More

Apache HTTP Server 2.0.44 vulnerable to ILLC attack

“The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response.”... Read More

VeriSign security seal could be forged

“Hugo Vázquez, from Infohacking, has discovered that the VeriSign security seal that guarantees the authenticity of a page could be manipulated through HTML injection.”... Read More

Demystifying Qubes OS Security

“AN OLD SCHOOL HACKING PRAGMATIC ANALYSIS”... Read More

A Spanish company founds holes in Check Point's Firewall

“The Spanish research company PenTest announced last week that it had found security holes in the firewall software of the information security company Check Point”... Read More

USN-145-1: wget vulnerabilities

“Hugo Vázquez Caramés discovered a race condition when writing output files. After wget determined the output file name, but before the file was actually opened (the time window is determined by the delay of the first received data packet)”... Read More

Holes found in SonicWall god box

“Multiple vulnerabilities have been found in SonicWall’s Network Security Appliance (NSA) 4500”... Read More

Holes in Firewall-1

“Spanish security researchers have discovered several vulnerabilities in the 'Firewall-1' security solution by software vendor Checkpoint, and are now questioning its Common Criteria EAL4+ certification. Pentest penetration testers discovered various bugs in the form”... Read More

Not only a XSS

“FIST Conference March 2004 Not only a XSS© Toni Cortes Martinez & Hugo Vazquez Carames Infohacking Research Barcelona, 7 May 2004”... Read More

ELECTRONIC BANKING, June 2006, nº97

“REPORTS Electronic Banking: new attack vectors (Page 11)”... Read More

How Hackers Think

“This is a bit technical, but it's a good window into the hacker mentality. This guy walks step by step through the process of figuring out how to exploit a Cisco vulnerability.”... Read More

Check Point plays down FireWall-1 bug reports

“Spanish security firm Pentest discovered multiple buffer overflow vulnerabilities during the course of a comprehensive security evaluation of the most secure version of the Check Point FireWall-1/VPN-1 security software”... Read More

JCaptcha Sound File CAPTCHA Security Bypass Vulnerability

“JCaptcha is prone to a security-bypass vulnerability.”... Read More

A Security Bug in iPlanet leaves Terra users vulnerable

“The SUN Microsystems iPlanet Messaging mail server is used by millions of users around the world, and in Spain by Terra.es (Terra Networks) among others.”... Read More

Multiple buffer overflows discovered in Check Point Firewall-1

“Spanish security firm Pentest has discovered 10 buffer overflows affecting different applications in Check Point’s flagship FireWall-1 security software.”... Read More

XSS in OWA allows obtaining user credentials

“A vulnerability discovered in OWA (Outlook Web Access) that can be used by a remote attacker to obtain user credentials”... Read More

$1m hacking challenge' product is flawed

“AlphaShield's "unhackable" consumer security device isn't unhackable, Spanish white hat hackers claim”... Read More

Cross-site scripting (XSS) vulnerability in WebLogExpert

“Cross-site scripting (XSS) vulnerability in WebLogExpert allows remote attackers to inject arbitrary web script or HTML via a crafted client domain name.”... Read More

iPlanet Log Analyzer Logfile HTML Injection Vulnerability

“Through exploitation of this issue, it will be possible to falsify log information and execute arbitrary script code in the web client of the user viewing the logs.”... Read More

Check Point FireWall-1 SDSUtil buffer overflow

“Check Point FireWall-1 is vulnerable to a stack-based buffer overflow”... Read More

A DoS breaks Bluetooth

“A team of experts belonging to the Catalan Infohacking crew has made publicly available a program considered capable of breaking any connection between Bluetooth devices”... Read More

News

Oct 24 2024
Pentest® presented its cyber security capabilities in a private conference for NATO READ MORE
Mar 23 2025
Here, our CEO outlines why this approach is not a valuable investment, as we consistently bypass 100% of EDR solutions—just as real attackers do. Instead, we will focus our efforts on analyzing other attack surfaces. READ MORE
Jan 17 2025
Pentest® has weaponized a new Linux Kernel DoS that causes RCU_sched to stall and will be available to customers for testing purposes READ MORE
Oct 01 2024
Exploiting GMail SSL to Present the Original Certificate Chain in a Man-in-the-Middle Attack READ MORE
Sep 23 2024
A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other countries in the Asia-Pacific (APAC) region, by exploiting a recently patched critical security flaw impacting OSGeo GeoServer GeoTools. READ MORE
Get a quote in 24h
Contact