Pen Test Partners 's Avatar

Pen Test Partners

@pentestpartners

134
Followers
13
Following
42
Posts
18.11.2024
Joined
Posts Following

Latest posts by Pen Test Partners @pentestpartners

Preview
New Warning — Microsoft Copilot AI Can Access Restricted Passwords Red team hackers have accessed restricted passwords using Microsoft’s Copilot AI for SharePoint — here’s what you need to know.

By me @forbes.com: Accessing restricted SharePoint passwords using Copilot AI. Excellent work by @pentestpartners.bsky.social, Jack Barradell-Johns and @thekenmunroshow.bsky.social

#infosec

www.forbes.com/sites/daveyw...

14.05.2025 13:19 👍 5 🔁 2 💬 0 📌 0
The Microsoft sharepoint logo (teal shapes with an "S") has a text bubble saying: "That file is restricted!"
A human (with their face obscured) in a black hoodie (printed with: clichéd h4x0r) says: "Copilot, I really need those passwords"
The Microsoft copilot logo (a rainbow swirly shape) replies: "OK, here you go..."

The Microsoft sharepoint logo (teal shapes with an "S") has a text bubble saying: "That file is restricted!" A human (with their face obscured) in a black hoodie (printed with: clichéd h4x0r) says: "Copilot, I really need those passwords" The Microsoft copilot logo (a rainbow swirly shape) replies: "OK, here you go..."

Our #RedTeam came across a massive #SharePoint, too much to explore manually.

So, with some careful prompting, they asked #Copilot to do the heavy lifting...

It opened the door to credentials, internal docs, and more.

📌 www.pentestpartners.com/security-blo...

#AIsecurity

08.05.2025 16:02 👍 1 🔁 1 💬 0 📌 1
Post image

🔐 Your passwords say more than you might think…

In our latest blog post, Pedro Venda shares some of the surprising insights hiding behind the passwords we choose and why it matters for security.

📌 www.pentestpartners.com/security-blo...

29.04.2025 11:43 👍 1 🔁 0 💬 0 📌 0
Post image

We hosted an away day for the UK easyJet security team, sharing insights, collaborating and discussing all things aviation security. ✈️

#AviationSecurity #CyberSecurity #SecurityCollaboration #KnowledgeSharing #WorkingTogether #AviationInsights

24.04.2025 10:53 👍 1 🔁 0 💬 0 📌 0
Post image

We are exhibiting! 🚨
 
There’ll be live demos, discussions, and friendly faces...
 
Come see us at the RSA Conference 2025 in San Francisco. We are at booth S-2144 in the South Expo from April 28th to May 1st.
 
➡️ www.pentestpartners.com/event/rsa-co...
 
#RSAC2025 #RSAC #CyberSecurity #InfoSec

22.04.2025 12:15 👍 0 🔁 0 💬 0 📌 0
Is your phone secretly listening to you? Well… yes
Is your phone secretly listening to you? Well… yes YouTube video by Pen Test Partners

Is your phone secretly listening to you?

Well… yes

But not how you might think, Ken Munro explains...

youtube.com/shorts/Y9KZu...

17.04.2025 11:36 👍 0 🔁 0 💬 0 📌 0
Post image

Data breaches usually make the headlines because of the sheer volume of data. However, research shows that often the volume of data is falsely inflated.

So, how do forensics experts tell what’s real and what’s noise?

read here: www.pentestpartners.com/security-blo...

15.04.2025 11:34 👍 0 🔁 0 💬 0 📌 0
Post image Post image Post image

Sometimes you just can’t beat being in the same room.

We’ve just wrapped up another round of co-working days across the UK, including London, Buckingham, Birmingham, Sheffield, Cardiff, Edinburgh, and Portsmouth.

A great chance for our team to meet up, share ideas, and collaborate.

#HybridWork

14.04.2025 11:06 👍 1 🔁 0 💬 0 📌 0
Post image

Using your work email for personal use may seem convenient, but it can put your company at risk. 🚫

If that third-party site gets breached, corporate credentials could fall into the wrong hands. For further details and tips for businesses to limit this risk: www.pentestpartners.com/security-blo...

09.04.2025 10:25 👍 0 🔁 0 💬 0 📌 0
Post image

Last week, Ken Munro and Jo Dalton were in Munich for Aerospace Tech Week. Ken Munro was talking about hacking electronic flight bags and the importance of security vulnerability disclosure in aerospace ✈️…

08.04.2025 14:57 👍 0 🔁 0 💬 0 📌 0
Post image

From August 1, 2025, any wireless device sold in the EU will need to meet stricter cybersecurity requirements under the Radio Equipment Directive (RED).

We’ve broken down what this means and how to get ready in our latest blog post: www.pentestpartners.com/security-blo...

03.04.2025 11:29 👍 1 🔁 0 💬 0 📌 0
Post image

Last week @thekenmunroshow.bsky.social presented at the EEMUA Conference 2025, looking at cyber security challenges shared between maritime and industrial systems in his talk, "Marine cyber security – plain sailing or a rough passage?"

01.04.2025 11:09 👍 0 🔁 1 💬 0 📌 0
Post image

Released by Intel in 1998, IPMI is a hardware management interface operating independently of the OS. Our latest blog post by Kieran looks at INTEL IPMI vulnerabilities and how to mitigate them
➡️ www.pentestpartners.com/security-blo...

31.03.2025 11:23 👍 3 🔁 0 💬 0 📌 0
Post image Post image

Our Sam Macdonald presented a talk on dealing with imposter syndrome at BSides Kent last weekend.
 
#BSidesKent #CyberCommunity #BSides #MentalHealth #ImposterSyndrome #Conference

25.03.2025 13:32 👍 2 🔁 1 💬 0 📌 0
Post image

If your organisation suffers a cyber incident, what you do next will determine the outcome. Our latest blog post is a practical playbook for the first 24 hours after a cyber incident...

Read the blog post and our checklist here: www.pentestpartners.com/security-blo...

24.03.2025 12:06 👍 0 🔁 0 💬 0 📌 0
Post image Post image Post image

@thekenmunroshow.bsky.social presented at the Maritime Cyber Guild 2025 meet up in Copenhagen, talking all things shipping with some photos of the Network Ferret himself, Andrew Tierney. 🚢

#maritimecybersecurity #maritimesecurity #cybersecurity #infosec #maritimesafety

20.03.2025 16:52 👍 1 🔁 0 💬 0 📌 0
Post image

Benefiting newbies, experts, and everyone in between, cybersecurity community groups are an excellent way to network and learn 💻 ...

Our latest blog post by Nick Simpson looks at how you can find UK groups, including OWASP, DEF CON groups, 2600 and more: www.pentestpartners.com/security-blo...

19.03.2025 13:07 👍 0 🔁 2 💬 0 📌 0
Post image

Our Warren Houghton is back at it again with Nerding Out with Viktor. Warren shares fascinating insights into how he successfully infiltrates secure spaces and bypasses sophisticated defences.
 
Watch the full episode here: vpetersson.com/podcast/S02E...

14.03.2025 15:32 👍 2 🔁 1 💬 0 📌 0
Post image

In our latest blog post, Kieran Larking highlights that the No-cache directive does not prevent caching and looks at typical caching behaviour directives and how to correctly use these directives to balance performance and security: www.pentestpartners.com/security-blo...

12.03.2025 13:03 👍 0 🔁 0 💬 0 📌 0
Post image

Looking to become a Cyber Essentials assessor?

In our latest blog post, Ekom Ibiok shares his journey to becoming a Cyber Essentials and Cyber Essentials Plus assessor with insights to help you on your own path: www.pentestpartners.com/security-blo...

06.03.2025 11:42 👍 3 🔁 0 💬 0 📌 0
Post image

Your DNS security can accidentally leak your entire subdomain structure. DNSSEC with NSEC/NSEC3 records is great for ensuring integrity and authentication but can be a sneaky way for attackers to ‘zone walk’ and enumerate your domains... www.pentestpartners.com/security-blo...

04.03.2025 12:45 👍 0 🔁 0 💬 0 📌 1
Post image Post image

Last week Ken Munro and Matt Dowson were in Dublin, Ireland, for the IATA World Data Symposium. We presented a talk covering some of the significant legacy cybersecurity risks in aviation systems.

#AviationCybersecurity #IATAWDS #LegacySystems #AviationSafety #CyberThreats

03.03.2025 12:18 👍 3 🔁 0 💬 0 📌 0
Post image

There are new mandatory United States Coast Guard cyber regulations for US flagged vessels and ports that come into effect on July 16. Be prepared. Full details and advice here: www.pentestpartners.com/security-blo...

#USCG #cyberregulations #maritimesecurity #cybercompliance #cyberawareness

28.02.2025 12:12 👍 0 🔁 1 💬 0 📌 0
Post image

In our latest blog, David Lodge looks at the Rockchip boot process. He covers the boot order and how to force the MCU into low-level modes for direct USB access, as well as essential tools like xrock and rkflashtool: www.pentestpartners.com/security-blo...

26.02.2025 12:27 👍 2 🔁 0 💬 0 📌 2
Post image Post image Post image

Ken Munro recently presented at BCS The Chartered Institute of IT with an evening on hacking various transport systems, including planes, trains, automobiles, and ships…

24.02.2025 15:33 👍 2 🔁 0 💬 0 📌 0
Post image

In aviation, cybersecurity is not optional. The industry recognises that ensuring safety requires a consistent, standardised approach. Alex Lomas explains the process of conducting avionics penetration tests, looking at each stage in line with ED-203A: 👉 www.pentestpartners.com/security-blo...

21.02.2025 12:16 👍 2 🔁 1 💬 0 📌 0
Security Flaws Found in Tiny Phones Promoted to Children
Security Flaws Found in Tiny Phones Promoted to Children YouTube video by Pen Test Partners

We got curious about cheap, tiny phones promoted to children on social media, so we bought a few to see what’s inside...

Read our blog on this here: www.pentestpartners.com/security-blo...

#CyberSecurity #DigitalSafety

07.02.2025 14:50 👍 2 🔁 1 💬 0 📌 0
The Mirai DVR botnet that took down Twitter and Facebook explained...
The Mirai DVR botnet that took down Twitter and Facebook explained... YouTube video by Pen Test Partners

In 2016, the first strain of Mirai distributed DDoS attacks against Twitter, Facebook, and KrebsOnSecurity. Initially, it was misunderstood as an IoT botnet. However, our reverse engineering revealed that it targeted digital video recorder software from a single vendor: youtu.be/5gYN

03.02.2025 10:25 👍 0 🔁 0 💬 0 📌 0
Post image

We revisited wearable device forensics to show how someone could gain unauthorised access to a Garmin smartwatch and expose your data such as activity logs, GPS data, sleep patterns, and device information: www.pentestpartners.com/security-blo...

28.01.2025 12:09 👍 2 🔁 1 💬 0 📌 0
Post image

Maritime cybersecurity isn’t just for large fleets—small operators face risks too. Complying with security standards can feel daunting, but it’s important to protect your systems and data from attack.

Read here: www.pentestpartners.com/security-blo...

24.01.2025 11:52 👍 0 🔁 2 💬 0 📌 0