
What after Recon? – Manual Hunting: Escaping the Recon Trap

Source link
Related Articles
All Mix →Is Prompt Injection a Vulnerability?
I want to respond to my buddy Joseph Thacker’s blog post about Prompt Injection and whether or not it’s a vulnerability. josephthacker.com Prompt Injection Isn’t…
Propaganda in a Box, Glacier-like Security, AGI by 2028?, Ancient Wisdom via AI, and Newsletter Differentiation
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original…
Common Nginx misconfigurations that leave your web server open to attack
Table of Contents Missing root location; Off-By-Slash Unsafe variable use SCRIPT_NAME Usage of $uri can lead to CRLF Injection Any variable Raw backend response reading…
Enriched attack surface view, DNS filtering, and more
Table of Contents TL/DR We’ve shipped several new features to improve the attack surface view, which includes filtering by DNS record type and viewing DNS…
Assign Severity Ratings on Custom Policies
Table of Contents Why would I use severity ratings with Attack Surface Custom Policies? Setting rules on fingerprinted technologies now possible “As part of our…
UL NO. 433: China’s Flawed Strategy
Table of Contents TOC NOTES Would you be interested in buying/reading this book? MY WORK SECURITY TECHNOLOGY HUMANS IDEAS & ANALYSIS RECOMMENDATION OF THE WEEK…