As penetration testers, we sometimes have to perform web application security assessments from our customer's computers instead of our beloved machines. When this happens, we can face different challenges when trying to set up a working test environment. We will most likely have very limited permissions, which can prevent us from installing applications or modifying … Continue reading Proxy managed by enterprise? No problem! Abusing PAC and the registry to get burpin’

