{"id":2467,"date":"2025-03-24T20:55:10","date_gmt":"2025-03-24T20:55:10","guid":{"rendered":"https:\/\/dradis.com\/blog\/?p=2467"},"modified":"2025-04-02T14:21:18","modified_gmt":"2025-04-02T13:21:18","slug":"what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis","status":"publish","type":"post","link":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/","title":{"rendered":"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis)"},"content":{"rendered":"\n<p>We\u2019re heading to Singapore for <strong>Black Hat Asia 2025<\/strong>, and we\u2019ll be showing off the latest in streamlined reporting and collaboration at our <strong>Dradis Arsenal demo<\/strong>. We\u2019re excited to be part of the <strong>Black Hat Arsenal<\/strong>, demoing how Dradis helps security teams collaborate and report more effectively.<\/p>\n\n\n\n<p>Catch us here:<\/p>\n\n\n\n<p>\ud83e\uddea <strong>Dradis @ Black Hat Arsenal<\/strong> \u00a0<br>Business Hall &#8211; Arsenal Station 3<br>\ud83d\udcc5 April 3, 10:05am-11:20am<\/p>\n\n\n\n<p><em>Learn how our most recent updates\u2014which include in-app quality assurance workflows, easier deployment with Docker, and AI-driven enhancements\u2014allow for the creation of reports faster and with greater quality. <\/em><\/p>\n\n\n\n<p>\ud83d\udccd <a href=\"https:\/\/www.blackhat.com\/asia-25\/arsenal\/schedule\/index.html#dradis-framework-streamlined-collaboration-and-reporting-for-security-professionals-43823\">See our Arsenal session<\/a><\/p>\n\n\n\n<p>When we\u2019re not presenting, we\u2019ll be diving into the briefings, trainings, and executive summits across AI, exploit development, cloud, and physical infrastructure. Here\u2019s what we\u2019re most excited about.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udd10 Briefings We\u2019re Watching<\/h1>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\ude97 DriveThru Car Hacking: Fast Food, Faster Data Breach<\/h4>\n\n\n\n<p><strong>Speakers:<\/strong> Alina Tan, George Chen, et al<br><strong>Tracks:<\/strong> Privacy, Network Security<br>A real-world case study of how a popular drive-thru system was compromised\u2014leading to credential theft, data exfiltration, and a full system takeover. <em>(Search the schedule page for the talk title)<\/em><\/p>\n\n\n\n<p>Link:&nbsp;<a href=\"https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#drivethru-car-hacking-fast-food-faster-data-breach-43514\">https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#drivethru-car-hacking-fast-food-faster-data-breach-43514<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83e\udde0 Tinker Tailor LLM Spy: Investigate &amp; Respond to Attacks on GenAI Chatbots<\/h4>\n\n\n\n<p><strong>Speaker:<\/strong> Allyn Stott<br><strong>Tracks:<\/strong> AI, Threat Hunting<br>Learn how to detect and respond to attacks on GenAI chatbots, including jailbreaks, prompt leaks, and advanced threat scenarios targeting language model behaviors.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#tinker-tailor-llm-spy-investigate--respond-to-attacks-on-genai-chatbots-44556\">https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#tinker-tailor-llm-spy-investigate&#8211;respond-to-attacks-on-genai-chatbots-44556<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u2601\ufe0f The Illusion of Isolation: How Isolation Failures in CI\/CD Servers Lead to RCE<\/h4>\n\n\n\n<p><strong>Speakers:<\/strong> Tian Zhou, Yiwen Wang<br><strong>Tracks:<\/strong> Enterprise Security, Application Security<br>Demonstrates real-world RCE attacks exploiting shared resources in CI\/CD environments. Focuses on sandbox bypasses, namespace collisions, and cross-tenant abuse.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#the-illusion-of-isolation-how-isolation-failures-in-cicd-servers-lead-to-rce-and-privacy-risks-43618\">https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#the-illusion-of-isolation-how-isolation-failures-in-cicd-servers-lead-to-rce-and-privacy-risks-43618<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\ude80 Unveiling the Mysteries of Qualcomm&#8217;s QDSP6 JTAG: A Journey into Advanced Theoretical Reverse Engineering<\/h4>\n\n\n\n<p><strong>Speaker:<\/strong> Alisa Esage<br><strong>Track:<\/strong> Reverse Engineering<br>An advanced reverse engineering walkthrough using QDSP6 JTAG on Qualcomm SoCs. Details undocumented memory regions, interface access, and mobile firmware analysis.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#unveiling-the-mysteries-of-qualcomms-qdsp-jtag-a-journey-into-advanced-theoretical-reverse-engineering-44550\">https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#unveiling-the-mysteries-of-qualcomms-qdsp-jtag-a-journey-into-advanced-theoretical-reverse-engineering-44550<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udcf1 Watch Your Phone: USB-Based File Access Attacks Against Mobile Devices<\/h4>\n\n\n\n<p><strong>Speakers:<\/strong> Florian Draschbacher, Lukas Maar<br><strong>Tracks:<\/strong> Mobile, Exploit Dev<br>A look at how attackers can access sensitive data on Android phones simply by connecting over USB\u2014even when locked. Includes analysis of newly discovered file access vectors.<\/p>\n\n\n\n<p>Link:<a href=\" https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#watch-your-phone-novel-usb-based-file-access-attacks-against-mobile-devices-43262\"> https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#watch-your-phone-novel-usb-based-file-access-attacks-against-mobile-devices-43262<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd25 <a href=\"https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/\">One Bug to Rule Them All: Preauth RCE on Windows Server 2025<\/a><\/h4>\n\n\n\n<p><strong>Speakers:<\/strong> Zhiniang Peng, Lewis Lee<br><strong>Tracks:<\/strong> Exploit Dev, Platform Security<br>Explores a novel pre-auth remote code execution vulnerability affecting Windows Server 2025, with a reliable exploitation chain and working proof of concept.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#one-bug-to-rule-them-all-stably-exploiting-a-preauth-rce-vulnerability-on-windows-server--44144\">https:\/\/www.blackhat.com\/asia-25\/briefings\/schedule\/#one-bug-to-rule-them-all-stably-exploiting-a-preauth-rce-vulnerability-on-windows-server&#8211;44144<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udf93 Trainings Worth Highlighting<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83e\uddec A Complete Practical Approach to Malware Analysis and Threat Hunting Using Memory Forensics (Online)<\/h4>\n\n\n\n<p><strong>Trainers:<\/strong> Monnappa K A &amp; Sajan Shetty<br>Great for anyone bridging DFIR and reverse engineering in incident response.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/training\/schedule\/index.html#a-complete-practical-approach-to-malware-analysis-and-threat-hunting-using-memory-forensics----edition-online--42806\">https:\/\/www.blackhat.com\/asia-25\/training\/schedule\/index.html#a-complete-practical-approach-to-malware-analysis-and-threat-hunting-using-memory-forensics&#8212;-edition-online&#8211;42806<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udd10 Advanced Infrastructure Hacking<\/h4>\n\n\n\n<p><strong>Trainer:<\/strong> NotSoSecure \/ Tiago Carvalho<br>Packed with practical labs for seasoned pentesters focusing on modern networks.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/training\/schedule\/index.html#advanced-infrastructure-hacking--42864\">https:\/\/www.blackhat.com\/asia-25\/training\/schedule\/index.html#advanced-infrastructure-hacking&#8211;42864<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83e\udd16 AI Red Teaming in Practice<\/h4>\n\n\n\n<p><strong>Trainers:<\/strong> Gary Lopez, Dr. Amanda Minnich (Microsoft AI Red Team)<br>Learn how real AI systems get attacked\u2014and how Microsoft red teams fight back.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/training\/schedule\/index.html#ai-red-teaming-in-practice--43046\">https:\/\/www.blackhat.com\/asia-25\/training\/schedule\/index.html#ai-red-teaming-in-practice&#8211;43046<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\uddd1\u200d\ud83d\udcbc From the Executive Summit<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83e\udde0 Accelerating ML SecOps: Breaking Barriers, Fueling Innovation<\/h4>\n\n\n\n<p><strong>Speaker:<\/strong> Andrew Chen<br>The opening keynote for the AI Summit\u2014and a great signal on where the field is heading.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/summit-sessions\/schedule\/index.html#opening-keynote--accelerating-ml-secops-breaking-barriers-fueling-innovation-44566\">https:\/\/www.blackhat.com\/asia-25\/summit-sessions\/schedule\/index.html#opening-keynote&#8211;accelerating-ml-secops-breaking-barriers-fueling-innovation-44566<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83d\udcb8 The War Against State Actors: Bleeding Edge Techniques Targeting Financial Services<\/h4>\n\n\n\n<p><strong>Speaker:<\/strong> Vivek Ramachandran<br>If you\u2019re defending high-value financial infrastructure, don\u2019t miss this.<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/summit-sessions\/schedule\/index.html#the-war-against-state-actors-bleeding-edge-techniques-targeting-financial-services-44898\">https:\/\/www.blackhat.com\/asia-25\/summit-sessions\/schedule\/index.html#the-war-against-state-actors-bleeding-edge-techniques-targeting-financial-services-44898<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\ud83e\udd16 LLM Firewalls: Are They the Future of AI Security?<\/h4>\n\n\n\n<p><strong>Speakers:<\/strong> Matthias Chin, Xiaojun Jia<br>Fireside chat on securing AI models with perimeter-style defenses\u2014what works, what\u2019s hype?<\/p>\n\n\n\n<p>Link: <a href=\"https:\/\/www.blackhat.com\/asia-25\/summit-sessions\/schedule\/index.html#fireside-chat--llm-firewalls-are-they-the-future-of-ai-security-44576\" rel=\"sponsored nofollow\">https:\/\/www.blackhat.com\/asia-25\/summit-sessions\/schedule\/index.html#fireside-chat&#8211;llm-firewalls-are-they-the-future-of-ai-security-44576<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udc4b Come say &#8216;Hi&#8217; <\/h2>\n\n\n\n<p>If your team is tired of copying and pasting findings, fighting with Word templates, or working in silos\u2014come see how Dradis makes reporting and collaboration painless.<\/p>\n\n\n\n<p>\ud83d\udccd <strong>Dradis @ Arsenal<\/strong><br>\ud83d\udcc5 Thursday, April 3 | 10:05am-11:20am<br>\ud83d\udd17 <a href=\"https:\/\/www.blackhat.com\/asia-25\/arsenal\/schedule\/#dradis-framework-streamlined-collaboration-and-reporting-for-security-professionals-43823\">Event link<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Dradis v4.15.0 includes automatic cross-references, custom tag ordering, and kit updates. <\/p>\n","protected":false},"author":16,"featured_media":2475,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":[]},"categories":[3,10],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis) - Dradis Framework Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis) - Dradis Framework Blog\" \/>\n<meta property=\"og:description\" content=\"Dradis v4.15.0 includes automatic cross-references, custom tag ordering, and kit updates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/\" \/>\n<meta property=\"og:site_name\" content=\"Dradis Framework Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-24T20:55:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T13:21:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dradis.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-25-at-15.44.22.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1308\" \/>\n\t<meta property=\"og:image:height\" content=\"1150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matthew Erskine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dradisfw\" \/>\n<meta name=\"twitter:site\" content=\"@dradisfw\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Erskine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/\",\"url\":\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/\",\"name\":\"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis) - Dradis Framework Blog\",\"isPartOf\":{\"@id\":\"https:\/\/dradis.com\/blog\/#website\"},\"datePublished\":\"2025-03-24T20:55:10+00:00\",\"dateModified\":\"2025-04-02T13:21:18+00:00\",\"author\":{\"@id\":\"https:\/\/dradis.com\/blog\/#\/schema\/person\/d44e754bd0f1e9c3f29ed836fc0526ef\"},\"breadcrumb\":{\"@id\":\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dradis.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dradis.com\/blog\/#website\",\"url\":\"https:\/\/dradis.com\/blog\/\",\"name\":\"Dradis Framework Blog\",\"description\":\"Information management for security teams\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dradis.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dradis.com\/blog\/#\/schema\/person\/d44e754bd0f1e9c3f29ed836fc0526ef\",\"name\":\"Matthew Erskine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dradis.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c1594c965dc5d3735e7d7ca331160508?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c1594c965dc5d3735e7d7ca331160508?s=96&d=mm&r=g\",\"caption\":\"Matthew Erskine\"},\"url\":\"https:\/\/dradis.com\/blog\/author\/matthew\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis) - Dradis Framework Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/","og_locale":"en_US","og_type":"article","og_title":"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis) - Dradis Framework Blog","og_description":"Dradis v4.15.0 includes automatic cross-references, custom tag ordering, and kit updates.","og_url":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/","og_site_name":"Dradis Framework Blog","article_published_time":"2025-03-24T20:55:10+00:00","article_modified_time":"2025-04-02T13:21:18+00:00","og_image":[{"width":1308,"height":1150,"url":"https:\/\/dradis.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-25-at-15.44.22.png","type":"image\/png"}],"author":"Matthew Erskine","twitter_card":"summary_large_image","twitter_creator":"@dradisfw","twitter_site":"@dradisfw","twitter_misc":{"Written by":"Matthew Erskine","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/","url":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/","name":"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis) - Dradis Framework Blog","isPartOf":{"@id":"https:\/\/dradis.com\/blog\/#website"},"datePublished":"2025-03-24T20:55:10+00:00","dateModified":"2025-04-02T13:21:18+00:00","author":{"@id":"https:\/\/dradis.com\/blog\/#\/schema\/person\/d44e754bd0f1e9c3f29ed836fc0526ef"},"breadcrumb":{"@id":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dradis.com\/blog\/2025\/03\/what-were-watching-at-black-hat-asia-2025-and-where-to-find-dradis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dradis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What We\u2019re Watching at Black Hat Asia 2025 (And Where to Find Dradis)"}]},{"@type":"WebSite","@id":"https:\/\/dradis.com\/blog\/#website","url":"https:\/\/dradis.com\/blog\/","name":"Dradis Framework Blog","description":"Information management for security teams","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dradis.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dradis.com\/blog\/#\/schema\/person\/d44e754bd0f1e9c3f29ed836fc0526ef","name":"Matthew Erskine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dradis.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c1594c965dc5d3735e7d7ca331160508?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c1594c965dc5d3735e7d7ca331160508?s=96&d=mm&r=g","caption":"Matthew Erskine"},"url":"https:\/\/dradis.com\/blog\/author\/matthew\/"}]}},"jetpack_featured_media_url":"https:\/\/dradis.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-25-at-15.44.22.png","jetpack_shortlink":"https:\/\/wp.me\/p3ijVs-DN","jetpack_sharing_enabled":false,"jetpack-related-posts":[{"id":2395,"url":"https:\/\/dradis.com\/blog\/2024\/08\/new-in-dradis-pro-v4-13\/","url_meta":{"origin":2467,"position":0},"title":"New in Dradis Pro v4.13","date":"August 8, 2024","format":false,"excerpt":"Dradis v4.12.0 includes CVSSv4, AWS and Azure official support, downloading attachments via the REST API, and Mappings Manager updates.","rel":"","context":"In &quot;Dradis_Pro&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dradis.com\/blog\/wp-content\/uploads\/2024\/01\/Screen-Shot-2024-01-16-at-4.41.11-PM.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":502,"url":"https:\/\/dradis.com\/blog\/2013\/12\/new-in-dradis-pro-v19\/","url_meta":{"origin":2467,"position":1},"title":"New in Dradis Pro v1.9","date":"December 27, 2013","format":false,"excerpt":"Today we're happy to announce a new release of Dradis Professional Edition: Dradis Pro v1.9. Start thinking about what you are going to do in 2014 with all the report-writing hours that Dradis will save you from spending :) This release brings new features and improvements at almost every level:\u2026","rel":"","context":"In &quot;Dradis_Pro&quot;","img":{"alt_text":"snowcrash-01","src":"https:\/\/i0.wp.com\/securityroots.com\/blog\/wp-content\/uploads\/2013\/12\/snowcrash-01.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":690,"url":"https:\/\/dradis.com\/blog\/2016\/04\/new-dradis-pro-v2-2\/","url_meta":{"origin":2467,"position":2},"title":"New in Dradis Pro v2.2","date":"April 14, 2016","format":false,"excerpt":"Dradis Professional Edition is a collaboration and automated reporting tool for information security teams that will cut your reporting time in half. Two short months after the release of Dradis Pro v2.1 in February we're pleased to bring you Dradis Pro v2.2 which is focused around connectivity and performance. The\u2026","rel":"","context":"In &quot;Dradis_Pro&quot;","img":{"alt_text":"Screenshot showing a GET request to the \/clients endpoint","src":"https:\/\/i0.wp.com\/securityroots.com\/blog\/wp-content\/uploads\/2016\/04\/rest_api-01.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2477,"url":"https:\/\/dradis.com\/blog\/2025\/04\/redesigning-dradis-a-fresh-look-for-a-better-navigation-and-consistency\/","url_meta":{"origin":2467,"position":3},"title":"Redesigning Dradis: A Fresh Look for a Better Navigation and Consistency","date":"April 2, 2025","format":false,"excerpt":"Dradis has been a trusted tool in the pentesting world for over 15 years. Many changes, features, and components have been added during that period, all with a single goal:\u00a0 Offer the best possible product to our users. However, as the platform evolved, the growing number of links and navigation\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dradis.com\/blog\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-02-at-3.47.24\u202fPM-2.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1458,"url":"https:\/\/dradis.com\/blog\/2020\/09\/hands-on-hacking\/","url_meta":{"origin":2467,"position":4},"title":"Hands on Hacking","date":"September 30, 2020","format":false,"excerpt":"The team over at Hacker House has recently released their first book,\u00a0Hands on Hacking. The book is an incredibly accessible guide for learning pentesting and purple teaming and includes often-overlooked subjects like building a business case for hacking, ethical guidelines, and report writing.\u00a0 Report writing, you say? Needless to say,\u2026","rel":"","context":"In &quot;Business of Software&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dradis.com\/blog\/wp-content\/uploads\/2020\/09\/hoh_dradis.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":669,"url":"https:\/\/dradis.com\/blog\/2016\/02\/new-dradis-pro-v2-1\/","url_meta":{"origin":2467,"position":5},"title":"New in Dradis Pro v2.1","date":"February 22, 2016","format":false,"excerpt":"Dradis Professional Edition is a collaboration and automated reporting tool for information security teams that will cut your reporting time in half. Throughout 2016 we're aiming to shorten our release cycle, and we're pleased to bring you Dradis Pro v2.1 with a collection of enhancements that will make your day-to-day\u2026","rel":"","context":"In &quot;Dradis_Pro&quot;","img":{"alt_text":"Screenshot showing the IssueLibrary entries with a badge showing their tags","src":"https:\/\/i0.wp.com\/securityroots.com\/blog\/wp-content\/uploads\/2016\/02\/dradis_2.1_01_issuelib.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/posts\/2467"}],"collection":[{"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/comments?post=2467"}],"version-history":[{"count":5,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/posts\/2467\/revisions"}],"predecessor-version":[{"id":2513,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/posts\/2467\/revisions\/2513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/media\/2475"}],"wp:attachment":[{"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/media?parent=2467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/categories?post=2467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dradis.com\/blog\/wp-json\/wp\/v2\/tags?post=2467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}