The Ethical Side of Penetration Testing: Navigating Legal and Ethical Boundaries This article discusses the nuances of ethical hacking and how to remain within the confines of legal and ethical frameworks, Read More
Modern Tools for Penetration Testing: The Essentials This article will explore some of the modern tools used for penetration testing in our rapidly changing technological world. Read More
Application Scan Identifies an SSRF Vulnerability; Penetration Test Finds Exploitation Attack Vectors In this demonstration we leverage a Server-Side Request Forgery (SSRF) vulnerability, and then abuse the privileges of two users to access the root system of the server. Read More
Padding Oracle Attack: Are You Vulnerable? In this demonstration, we will mount a cryptographic attack known as a "padding oracle attack" against a web application that uses an unauthenticated AES-CBC crypto scheme. Read More