Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

ON-DEMAND WEBINAR

Pentera Labs Webinar: VMware vCenter CVE-2022-22948

Webinars
Apr 13, 2022

A vulnerability chain in VMware vCenter shows how information disclosure combined with privilege escalation can lead to full ESXi compromise. The session demonstrates why exploit paths—not just CVSS scores—must guide remediation priorities.

This webinar presents detailed research into a vulnerability chain discovered in VMware vCenter that could ultimately lead to full ESXi takeover. The session explains VMware’s architecture, where ESXi acts as the hypervisor hosting virtual machines and vCenter Server manages the environment centrally. The researchers uncovered that an out-of-the-box vCenter installation exposed a file containing cleartext database credentials, which provided visibility into ESXi inventory data and revealed an internal ESXi management account along with its encrypted password.

Although the password was encrypted, a separate privilege escalation vulnerability allowed retrieval of the encryption key, enabling decryption of the ESXi management credentials. This chain could grant full administrative control over ESXi, potentially enabling ransomware deployment, data exfiltration, or manipulation of security controls. The session emphasizes prioritizing vulnerabilities based on exploit chains and business impact rather than severity scores alone, and concludes with disclosure details, mitigation guidance, and lessons for risk-based validation.