Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

ON-DEMAND WEBINAR

Cyber Attack Explained: Zero-Days in FortiClient VPN

Webinars
Dec 10, 2024

A gut feeling led researchers to investigate Windows named pipes and uncover two vulnerabilities. The session explains how permissive permissions and elevated services enabled local privilege escalation, how configuration restore features could be abused for stealthy tampering and persistence, and closes with mitigations and lessons for defenders.

This webinar walks through the discovery and exploitation story behind two vulnerabilities in a VPN client, starting from an investigation into Windows named pipes. It explains IPC concepts, named pipes, and ACLs, then shows how overly permissive permissions combined with a SYSTEM-privileged service created conditions for local privilege escalation. It demonstrates reverse engineering of pipe communication, bypassing custom barriers via process injection, and abuse of configuration restore functionality to change settings and suppress certificate warnings. It also covers a second issue involving encrypted pipe communication weakened by a hard-coded key recoverable through reverse engineering, and ends with mitigation steps and broader lessons for secure design.