How WebSockets Work? Vulnerabilities and Security Best Practices WebSocket is a real-time bidirectional communication protocol designed for efficient data exchange between a client (web browser, application) and a s... 12.03 Applications
What is Clickjacking? Exploitations and Security Best Practices Clickjacking is a discreet but formidable attack technique. It exploits the user interface to trick victims into interacting with invisible or disguis... 21.02 Applications
Phishing Campaign: Objectives, Methodology, Spear and Mass Phishing Examples Phishing remains one of the most formidable and widely used techniques in cyber attacks. Exploiting human weakness, this method consists of tricking v... 21.02 Phishing & Social Engineering
Content Security Policy Bypass Techniques and Security Best Practices Content Security Policy (CSP) is an essential security measure for protecting web applications against certain types of attack. By defining strict rul... 12.02 Applications
What is Object Injection? Exploitations and Security Best Practices Object injection is an application vulnerability that occurs when an application deserializes untrusted data. If an attacker manages to inject a malic... 07.02 Applications
What is Blind SQL Injection? Attack Types, Exploitations and Security Tips Blind SQL Injections are a category of SQL injection. Unlike traditional SQL injections, they do not directly provide the results of queries or detail... 04.02 Applications
What is Kerberoasting? Attack and Security Tips Explained Kerberoasting is a common attack in Active Directory environments. It is based on a weakness in the Kerberos protocol, but its exploitation requires s... 04.02 Infra & Network
How to Detect Secrets? Tools and Techniques Before discussing techniques and tools, it is essential to define the ‘secrets’ sought during penetration tests. These secrets are generally private c... 13.01 Applications
XPath Injections: Exploitations and Security Tips Although XML is an old language, it is still widely used, particularly in the banking sector. If you’re a pentester or a developer, you’re... 13.01 Applications