BadPods Series: Everything Allowed on AWS EKS
I have recently started out with Kubernetes, learning about scheduling, deployments, replicaSets and what even a pod is. And I
Read MoreI have recently started out with Kubernetes, learning about scheduling, deployments, replicaSets and what even a pod is. And I
Read MoreReconnaissance Let’s do a port scan on Alert machine. A HTTP server on port 80 is listening. Adding 10.10.11.44 alert.htb
Read MoreIntro Last month, my team and I participated in the CCDC competition – an exciting cyber defense challenge where teams
Read MoreToday, we will be doing Gunship from HackTheBox which is labeled as an easy-level Web challenge that aims at teaching AST injection
Read MoreIn this blog post, I’ll take you through my hands-on exploration of common web vulnerabilities using the OWASP Broken Web
Read MoreBackground Previously, the common way for granting authenticated access to web applications was through the use of a username and
Read MoreAmbient Authority in the browser Whenever the browser sends off an HTTP request, it includes all the corresponding cookies for
Read MoreFFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for
Read MoreThe cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the
Read More