OAuth 2.0 — Security Considerations
Background Previously, the common way for granting authenticated access to web applications was through the use of a username and
Read moreBackground Previously, the common way for granting authenticated access to web applications was through the use of a username and
Read moreAmbient Authority in the browser Whenever the browser sends off an HTTP request, it includes all the corresponding cookies for
Read moreFFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for
Read moreThe cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the
Read moreToday, we will be doing Undetected from HackTheBox which is labeled as an medium-level box that aims at teaching package misconfigurations, binary
Read moreToday, we will be doing Doctor from HackTheBox which is labeled as an easy-level box that aims at teaching web enumeration, server
Read moreToday, we will be doing BookStore from TryHackMe which is labeled as an intermediate-level room that aims at teaching web enumeration, local
Read morecurl is a command-line utility for transferring data from or to a server designed to work without user interaction. With curl, you
Read moreJust starting a career in security and need a good foundation? Are you among the ones from the early stages
Read moreIn this article, we will act as a network defender and apply our expertise in intrusion detection and response skills
Read more