
Breaking VNC Clients with Evil Servers | Eugene Lim

Source link
Related Articles
All Mix →Common security misconfigurations and remediations
A misconfiguration is exactly what it sounds like; something that is wrongly configured. From a security perspective this can be either fairly harmless, or in…
Same Origin Policy | Daniel Miessler
One of the more important topics in web application security is the same origin policy. It is a browser-based defense mechanism that makes it so…
What do we want? Vulnerabilities! What type do we want? Well…
Table of Contents CMS core vulnerabilities: Third party misconfigurations: Coding mistakes: Extension vulnerabilities: In conclusion: … we want them all. Vulnerabilities submitted to us from…
12 Days of Hacky Holidays CTF
Dear hackers, The Grinch has gone hi-tech this year with the intentions of ruining the holidays and we need you to infiltrate his network and…
GUIDE: The false positive report process
My name is Linus Särud. I’m a Detectify Security Researcher and responsible for incoming support emails. Going forward, we will identify popular subjects from the…
What Is the Digital Operational Resilience Act (DORA)?
Table of Contents Why DORA and Why Now? DORA and Pentesting Satisfy DORA Requirements with HackerOne’s Comprehensive Security Testing Solutions DORA focuses on Information and…