unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Modifying Java Serialized Objects as Easily as JSON
Often, when we hear about Java serialization, we find resources or challenges that only ta...
2024-4-11 13:16:29 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
zelda
serialized
serde
annotations
burp
What is a DoS Attack? Types, Exploitations and Security Tips
In the space of 5 years, the number of Denial of Service (DoS) attacks has almost doubled....
2024-4-11 10:1:27 | 阅读: 5 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
fragment
victim
attacker
client
Black Box Penetration Testing: Objective, Methodology and Use Cases
During a penetration test, we generally consider 3 test conditions: black, grey or white b...
2024-3-11 12:33:12 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
attacker
network
passwords
auditor
White Box Penetration Testing: Objectives, Methodology and Use Cases
When pentesting a web application, an API or an internal network, there are generally 3 ap...
2024-2-29 13:43:54 | 阅读: 4 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
analysis
identify
backup
Antivirus and EDR Bypass Techniques
Antivirus, anti-malware and EDR are tools commonly used to prevent attacks.However, th...
2024-2-23 09:46:7 | 阅读: 11 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
windows
malicious
etw
security
ssn
Smishing (SMS Phishing): How to Identify Attacks and Protect Yourself?
What is Smishing?You will no doubt be familiar with phishing, which consists of sendin...
2024-2-5 12:35:41 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
smishing
attacker
pretext
webmail
Penetration Testing: Methodology, Scope and Types of Pentests
With cybersecurity risks on the rise, it is becoming more and more obvious to carry out a...
2024-2-5 09:48:5 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
grey
carried
pentesters
Exploring Password Reset Vulnerabilities and Security Best Practices
Passwords are still the most common way of authenticating a user. However, setting up a pa...
2024-1-26 11:32:3 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
attacker
victim
security
expiration
mozilla
Introduction to Burp Suite, the Tool Dedicated to Web Application Security
Burp is an essential offensive security tool. It is used by a majority of professionals (i...
2024-1-15 13:37:2 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
burp
pentester
intruder
repeater
proxy
API Penetration Testing: Objective, Methodology, Black Box, Grey Box and White Box Tests
APIs are prime targets for attackers because of their exposure and critical nature, partic...
2024-1-4 10:18:15 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
routes
security
useguards
grey
Mobile Application Penetration Testing: Objective, Methodology and Testing Scope
Mobile applications are increasingly used in all areas of business: HR, finance, insurance...
2023-11-13 10:22:59 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
masvs
malicious
attacker
Security Misconfiguration: OWASP Top 10 #5
Security misconfiguration is a worrying problem, occupying fifth place in the OWASP Top 10...
2023-10-25 09:3:27 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
developers
buckets
acp
acls
Vulnerable and Outdated Components: OWASP Top 10 #6
Third-party components are omnipresent in web applications. Libraries, frameworks and othe...
2023-10-24 14:26:32 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
swagger
glpi
library
attacker
RCE (Remote Code Execution): Exploitations and Security Tips
Exploiting a RCE vulnerability for a pentester is something of a Holy Grail. Depending on...
2023-10-23 12:55:31 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
attacker
php
machine
network
Understanding and Preventing CORS Misconfiguration
Before presenting practical examples of CORS misconfiguration, it is important to define s...
2023-10-23 08:48:46 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
authorised
origins
whitelist
sop
security
Insecure Authentication Tokens leading to Account Takeover
Most applications have a critical feature for identifying users. The aim is to guarantee t...
2023-9-18 12:18:36 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
encryption
forge
company1
passphrase
grey
Introduction to Exegol, an Environment Dedicated to Offensive Security
IntroductionExegol is a tool that simplifies the creation of security test environmen...
2023-9-13 09:46:12 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
exegol
containers
security
development
aliases
Internal Penetration Testing: Objective, Methodology, Black Box and Grey Box Tests
Faced with an ever-increasing number of internal attacks, network infrastructure security...
2023-8-18 08:58:3 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
attacker
network
pentester
privileges
Exploiting an LFI (Local File Inclusion) Vulnerability and Security Tips
When we visit a website, it is common to be able to browse different pages. Each page can...
2023-8-7 08:28:25 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
php
passwd
attacker
client
Web Application Penetration Testing: Objective, Methodology, Black Box, Grey Box and White Box Tests
Faced with an ever-increasing number of sophisticated attacks, web application security is...
2023-8-1 09:33:5 | 阅读: 3 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
security
grey
identify
Previous
4
5
6
7
8
9
10
11
Next