Assumed Breach: Objectives, Methodology, Test Scenarios and Use Cases At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer ... 30.12 Applications
What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
What is a Race Condition? Exploitations and Security Best Practices With a good Internet connection and high-performance hardware, users can have the impression that their actions on a web page are instantaneous or alm... 30.10 Applications
Subdomain Enumeration Techniques and Tools Various subdomain enumeration techniques are used to identify the attack surface of a domain or organisation.The aim is to obtain as complete a list a... 09.10 Applications
Cloudflare: How to Secure Your Origin Server? Cloudflare has established itself as a key player on the web in recent years, offering not only CDN services, but also protection against various atta... 08.10 Applications
What is Command Injection? Exploitations and Security Best Practices Command injections are one of the most critical vulnerabilities in web security. They occur when an attacker manages to execute arbitrary system comma... 13.09 Applications
What is Pre-Account Takeover? Exploitations & Security Tips Pre-Account Takeover is a type of attack that we very often carry out during our audits. Although it is only possible in very specific situations, the... 12.09 Applications
What is RFI? Remote File Inclusion Exploitations and Security Tips Security vulnerabilities are a major risk for modern web applications, potentially exposing sensitive user data and corporate infrastructures to malic... 03.09 Applications
Exploring Email Change Vulnerabilities and Security Best Practices Whatever the web application, it is common practice to allow users to change their email address. This functionality is critical because it has a dire... 23.08 Applications