= 1024; if (!isDesktop) { megaMenuOpen = null; activeDropdown = null; }" class="font-heebo sticky top-0 z-40 w-full bg-white px-4 shadow-sm sm:px-6 xl:px-8" x-init="$watch('megaMenuOpen', value => { // Don't prevent scroll for desktop mega menus if (!isDesktop && value !== null) { document.body.classList.add('menu-open'); } else if (value === null) { document.body.classList.remove('menu-open'); } })">
Hackify
Pentest
WEB
Webapplicatie pentest
Website pentest
API pentest
FYSIEK
Laptop pentest
Mystery guest
WiFi pentest
Werkplek pentest
INFRA
Bedrijfsnetwerk pentest
Active Directory pentest
Infrastructuur pentest
Vulnerability scan
MOBILE
Android pentest
iOS pentest
CLOUD
Azure pentest
Microsoft 365 pentest
Sharepoint pentest
Azure resource pentest
AWS pentest
GCP pentest
Gsuite pentest
Attack Surface pentest
COMPLIANCE
DigiD pentest
AFAS pentest
BIO pentest
ISO27001 pentest
PCI DSS pentest
NIS2 pentest
NEN7510 pentest
CCV pentest
Phishing
Phishing simulatie
Cloudphishing
MFA phishing
Spear phishing
Phishing as a service
Phishing awareness
Training
Hacktraining
Pentest training
OWASP top 10 training
Phishing training
Cybercrisistraining
Over ons
Missie & Visie
Partners
Begrippen
Werken bij
Vacatures
Stage / OSCP-minor
Blog
Contact Opnemen
Pentest
WEB
Webapplicatie pentest
Website pentest
API pentest
FYSIEK
Laptop pentest
Mystery guest
WiFi pentest
Werkplek pentest
INFRA
Bedrijfsnetwerk pentest
Active Directory pentest
Infrastructuur pentest
Vulnerability scan
MOBILE
Android pentest
iOS pentest
CLOUD
Azure pentest
Microsoft 365 pentest
Sharepoint pentest
Azure resource pentest
AWS pentest
GCP pentest
Gsuite pentest
Attack Surface pentest
COMPLIANCE
DigiD pentest
AFAS pentest
BIO pentest
ISO27001 pentest
PCI DSS pentest
NIS2 pentest
NEN7510 pentest
CCV pentest
Phishing
Phishing simulatie
Cloudphishing
MFA phishing
Spear phishing
Phishing as a service
Phishing awareness
Training
Hacktraining
Pentest training
OWASP top 10 training
Phishing training
Cybercrisistraining
Over ons
Missie & Visie
Partners
Begrippen
Werken bij
Vacatures
Stage / OSCP-minor
Blog
Contact Opnemen
WIJ ZIJN
|
HACKERS
WIJ ZIJN
HACKERS
Pentest
CVE-2023-28130 - Command injection in Check Point Gaia Portal
Pentests.nl has discovered a vulnerability in Check Point Gaia Portal which, as an authenticated user, could be exploited to execute commands on the operating system.
CVE-2023-27532 - kwetsbaarheid in Veeam Backup & Replication
Er is een kwetsbaarheid ontdekt binnen Veeam Backup & Replication, waardoor een ongeauthenticeerde gebruiker toegang kan krijgen tot inloggegevens en zelfs code kan uitvoeren op het systeem. In deze blogpost lees je hoe we de kwetsbaarheid hebben uitgebuit.
Stored XSS in BigBlueButton
Pentests.nl has discovered a vulnerability in BigBlueButton (version 2.4.7 and prior) which could be exploited to perform stored Cross-Site Scripting (XSS) attacks by sending private messages to users.