The shades of tunneling
The shades of tunneling Solution for common pivoting problems during a Penetration Test by Karol Mazurek During penetration testing, you …
Read MoreOpen Authorisation Exploitation
Open Authorisation Exploitation Cameron Coller, a SIEM Engineers at Stripe OLT, shares his thoughts on Open Authorisation Exploitation and demonstrates …
Read MoreHow I created an undetectable Backdoor for Windows — Ethical Hacking
How I created an undetectable Backdoor for Windows — Ethical Hacking by Gourav Dhar What is a Backdoor? Backdoor is …
Read MoreSaaS Security Checklist: Best Practices to Protect SaaS Application
SaaS Security Checklist: Best Practices to Protect SaaS Application by Mehul Rajput When companies move their data and apps to …
Read MoreCredential Stuffing 2022: The Latest Attack Trends and Tools
Credential Stuffing 2022: The Latest Attack Trends and Tools by Robin Chan Latest Attack Trends Credential stuffing attacks are on …
Read MoreWhen to go full Spartan Defense in Data Management?
When to go full Spartan Defense in Data Management? Protecting a great load of data has become especially overwhelming during …
Read MorePWN Tips && Tricks — LINUX
PWN Tips && Tricks — LINUX by Karol Mazurek Each #TIP will be described according to the template below. Short description Script …
Read MoreRCE with Server-Side Template Injection
RCE with Server-Side Template Injection by Nairuz Abulhul Server-side template injection is a web application vulnerability that occurs in template-generated …
Read MoreBuilding an Incident Response Process for SQL Injection Attacks
Building an Incident Response Process for SQL Injection Attacks by Gilad David Mayaan In a DevSecOps organization, security and development …
Read MoreCybersecurity risks and how to prevent them effectively
Cybersecurity risks and how to prevent them effectively The development of the internet has changed the way people go about …
Read More