Hacked & Secured: Pentest Exploits & Mitigations

Amin Malekpour

If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, developer, or blue teamer, you'll gain actionable insights to apply in your work. 🎧 New episodes every month. 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram, Website Link 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A    📧 Feedback? Email Us → podcast@quailu.com.au

  1. SEP 29

    Ep. 13 – nOAuth Account Misbinding & Assumed-Breach to Domain Admin (Season Finale)

    One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead of a stable subject/issuer identifier. With a crafted identity on a controlled domain, an attacker could land a valid session as another user. From wall socket to Domain Admin — No NAC on the switch enabled quiet network access, followed by username harvesting and a light password spray to a low-priv account. From there: AD enumeration, weak service credentials, and abuse of certificate services to escalate to Domain Admin.What you’ll learn: how identity claims should be bound in modern SSO, how to harden join and mapping flows, and a practical checklist to shut down common internal escalation paths (NAC, credential hygiene, service principals, AD CS, and monitoring). Chapters: 00:00 - INTRO 01:27 - FINDING #1 - nOAuth: the email you shouldn’t have trusted 07:22 - FINDING #2 - From one wall socket to Domain Admin 13:43 - OUTRO Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode! 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → podcast@quailu.com.au 🔗 Podcast Website → Website Link

    15 min
  2. JUL 24

    Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong

    One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attackers reset passwords without access to email.Session Hijack in OTP Login – A logic flaw in how login tokens were handled allowed full account access with just a user ID.Remote Code Execution via Java Deserialization – A community-contributed finding where an exposed service deserialized untrusted input, leading to code execution.These aren’t complex chains. They’re common mistakes with big impact—and important lessons for developers, security teams, and testers. Chapters: 00:00 - INTRO 00:59 - FINDING #1 - Account Takeover via Forgot Password 06:26 - FINDING #2 - Shared Session Token in SMS Login Flow 10:39 - FINDING #3 - Java Deserialisation to Remote Code Execution 16:13 - OUTRO Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode! 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → podcast@quailu.com.au 🔗 Podcast Website → Website Link

    17 min

About

If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, developer, or blue teamer, you'll gain actionable insights to apply in your work. 🎧 New episodes every month. 🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram, Website Link 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A    📧 Feedback? Email Us → podcast@quailu.com.au