Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

ON-DEMAND WEBINAR

When the Lab Door Stays Open: Exposed Training Apps Exploited for Fortune 500

Webinars
Feb 16, 2026

A research-led deep dive into publicly exposed vulnerable training apps, how attackers exploit them to reach underlying cloud infrastructure, and why “lab environments” routinely become real-world breach paths.

Training apps like DVWA, Juice Shop, bWAPP, and Hackazon are commonly used to teach OWASP Top 10 vulnerabilities and support demos and proof-of-value exercises. The problem is that these intentionally vulnerable apps often escape lab boundaries and end up exposed on real infrastructure, including cloud environments connected to broader organizational systems. This session presents a research-driven investigation into how common these exposures are at scale, how they were found using OSINT search engines and fingerprinting techniques, and what happens after exploitation. Findings include a large pool of candidates narrowed to verified exposed training apps, many hosted on major cloud providers, and cases where cloud identities enabled access beyond the vulnerable app. It also covers evidence that some exposed environments were already compromised, including cryptomining campaigns and persistence mechanisms.