Category: Mix

What Does Belgium’s New Legal Framework On Hacking Mean For Me?
14
Apr
2023

What Does Belgium’s New Legal Framework On Hacking Mean For Me?

The Belgian government has recently announced a new Belgian law that will allow ethical hackers to hack any Belgian company…

Capture the flag: reversing the passwords (Solutions)
14
Apr
2023

Capture the flag: reversing the passwords (Solutions)

Step 1 – Recovering the corrupted data According to the doc, the following stream is corrupted: 7b 0a 20 a0…

How to set up Attack Surface Custom Policies
14
Apr
2023

How to set up Attack Surface Custom Policies

Validate security policies like you mean it Not everything on your attack surface is a vulnerability. Every organization has their…

importalignment-miessler
14
Apr
2023

import alignment: A Library-based Approach to AI Alignment

What if we could send AI a message as soon as it wakes up? Created/Updated: April 3, 2023 There is…

14
Apr
2023

Your cybersecurity starter pack | victoria.dev

Basic security best practices to share with your non-technical friend. Readers of my blog typically know more about technology and…

Nahamsec interviews Albinowax
14
Apr
2023

Nahamsec interviews Albinowax

Note that during these interviews I also moderate thus quality may vary. Profile 🐝 Head of research at Portswigger University…

The Hidden Gems Of The Burp Suite Settings [April 2023 version]
14
Apr
2023

The Hidden Gems Of The Burp Suite Settings [April 2023 version]

The Hidden Gems Of The Burp Suite Settings [April 2023 version] Source link

A malicious actor could rotate tokens of a victim, given that he knows the victim's token ID
14
Apr
2023

A malicious actor could rotate tokens of a victim, given that he knows the victim’s token ID

Cloudflare Public Bug Bounty disclosed a bug submitted by esx: https://hackerone.com/reports/1525309 – Bounty: $2700 Source link

Objection console
14
Apr
2023

Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps

Diving straight into reverse-engineering iOS apps can be daunting and time-consuming. While wading into the binary can pay off greatly…

ropnop blog
14
Apr
2023

Thotcon 2016 – Abusing Linux Trust Relationships

Slides Supplemental Demo Video: Source link

Finding client-side prototype pollution with DOM Invader | Blog
14
Apr
2023

Finding client-side prototype pollution with DOM Invader | Blog

Gareth Heyes | 20 June 2022 at 12:37 UTC Last year we made it significantly easier to find DOM XSS,…

Web API Security
14
Apr
2023

Web API Security

Introduction Web API는 웹에서 사용 또는 웹을 기반으로 사용되는 API를 의미합니다. 기본적으로 웹에서 사용되는 API라고 알려져 있지만 모바일, IoT 등…