unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Exploring Email Change Vulnerabilities and Security Best Practices
Whatever the web application, it is common practice to allow users to change their email a...
2024-8-23 17:9:7 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
validated
attacker
privileged
Introduction to Nuclei, an Open Source Vulnerability Scanner
IntroductionWith IT threats constantly evolving, businesses need to ensure that their...
2024-8-23 16:44:52 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
nuclei
identify
audits
security
What are IoT Attack Vectors and Security Challenges?
IoT security is a key issue for organisations. In all sectors and areas of activity (healt...
2024-8-6 23:26:37 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
hardware
attacker
network
software
Security Audits: Objectives, Types and Methodologies
With cyberattacks on the rise, carrying out an IT security audit has never been a higher p...
2024-8-6 21:55:42 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
audits
What is Prototype Pollution? Exploitations and Security Tips
Prototype pollution vulnerabilities are specific to JavaScript. They can be exploited on b...
2024-8-6 17:34:25 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
pollution
client
polluted
Phishing: Methodology, Common Techniques and Tools
We can’t talk about social engineering without mentioning phishing. Similarly, email is es...
2024-8-5 21:22:8 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
phishing
attacker
victim
dropbox
Account Takeover Techniques and Security Best Practices
Account takeover is a common practice that threatens the security of users and their data....
2024-7-22 17:26:43 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
attacker
passwords
phishing
SAML: How it Works, Vulnerabilities and Common Attacks
Secure identity and access management has become a key challenge for organisations. Among...
2024-7-19 22:31:19 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
assertion
idp
assertions
security
Understanding NTLM Authentication and NTLM Relay Attacks
In an office environment, user workstations generally use Windows operating systems and th...
2024-7-8 18:30:19 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
windows
llmnr
network
machine
Sqlmap, the Tool for Detecting and Exploiting SQL Injections
IntroductionSurely one of the best-known vulnerabilities, and one that has been aroun...
2024-6-7 21:40:45 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
sqlmap
injection
database
injections
payload
Exploring LLM Vulnerabilities and Security Best Practices
You’ve probably heard about the arrival of LLMs in a big way, at least with ChatGPT.LL...
2024-5-14 02:39:25 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
llm
chatgpt
injection
prompts
GraphQL API Vulnerabilities, Common Attacks and Security Tips
Developed in 2012 and made open source in 2015 by Facebook, GraphQL (Graph Query Language)...
2024-5-13 22:48:11 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
mutation
mutations
malicious
Identification and Authentication Failures: OWASP Top 10 #7
Authentication and, by extension, user identification are central to web applications....
2024-4-15 18:19:59 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
passwords
sso
attacker
security
Modifying Java Serialized Objects as Easily as JSON
Often, when we hear about Java serialization, we find resources or challenges that only ta...
2024-4-11 13:16:29 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
zelda
serialized
serde
annotations
burp
What is a DoS Attack? Types, Exploitations and Security Tips
In the space of 5 years, the number of Denial of Service (DoS) attacks has almost doubled....
2024-4-11 10:1:27 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
fragment
victim
attacker
client
Black Box Penetration Testing: Objective, Methodology and Use Cases
During a penetration test, we generally consider 3 test conditions: black, grey or white b...
2024-3-11 12:33:12 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
attacker
network
passwords
auditor
White Box Penetration Testing: Objectives, Methodology and Use Cases
When pentesting a web application, an API or an internal network, there are generally 3 ap...
2024-2-29 13:43:54 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
analysis
identify
backup
Antivirus and EDR Bypass Techniques
Antivirus, anti-malware and EDR are tools commonly used to prevent attacks.However, th...
2024-2-23 09:46:7 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
windows
malicious
etw
security
ssn
Smishing (SMS Phishing): How to Identify Attacks and Protect Yourself?
What is Smishing?You will no doubt be familiar with phishing, which consists of sendin...
2024-2-5 12:35:41 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
smishing
attacker
pretext
webmail
Penetration Testing: Methodology, Scope and Types of Pentests
With cybersecurity risks on the rise, it is becoming more and more obvious to carry out a...
2024-2-5 09:48:5 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
grey
carried
pentesters
Previous
2
3
4
5
6
7
8
9
Next