Blog Unauthenticated RCE in Draytek Vigor 2960, 3900 and 300 (CVE-2020-8515) CVE: CVE-2020-8515 DrayTek Vigor enterprise switches, load-balancers, routers and VPN gateway devices are affected by… Dreamlab30. Juni 2020
Blog Understanding ATT&CK for Industrial Control Systems (Part I) By Yamila Levalle, Security Researcher at Dreamlab Technologies MITRE introduced the Adversarial Tactics, Techniques, and Common… Dreamlab29. Juni 2020
Blog Kernel Capabilities in Docker: A fine-grained Access Control System By Sheila A. Berta, Head of Research at Dreamlab Technologies Kernel capabilities turn the binary… Dreamlab16. Juni 2020
Blog User namespace remapping: an advanced feature to protect your Docker environments! By Sheila A. Berta, Head of Research at Dreamlab Technologies Unlike many technologies, Docker is… Dreamlab6. Mai 2020
Blog Dump the Raft logs in Docker Swarm to get secrets and more! By Sheila A. Berta, Head of Research at Dreamlab Technologies When docker installations are running… Dreamlab29. April 2020
Blog Bypassing Air Gaps in ICS Systems By Yamila Levalle An air gap, air wall or air gapping is a network security… Dreamlab23. April 2020
Blog Starbucks IDOR: How we prevented an information leak of 6 million Starbucks customers By Yamila Levalle I know where you had coffee last summer! In this blogpost we… Dreamlab18. März 2020
Blog Fuzzing ICS Protocols By Yamila Levalle Traditionally, industrial control systems have been isolated networks with controlled states and very consistent… Dreamlab10. März 2020
Blog Abusing docker.sock exposure By Sheila A. Berta, Head of Research at Dreamlab Technologies and Sol Ozzan, Security Researcher… Dreamlab6. März 2020