Subdomain Enumeration Techniques and Tools Various subdomain enumeration techniques are used to identify the attack surface of a domain or organisation.The aim is to obtain as complete a list a... 09.10 Applications
What is Kerberos? Kerberos Authentication Explained Kerberos is an authentication protocol used in a Microsoft Active Directory context. The lack of knowledge about how it works can lead to the introduc... 08.10 Infra & Network
Cloudflare: How to Secure Your Origin Server? Cloudflare has established itself as a key player on the web in recent years, offering not only CDN services, but also protection against various atta... 08.10 Applications
What is Command Injection? Exploitations and Security Best Practices Command injections are one of the most critical vulnerabilities in web security. They occur when an attacker manages to execute arbitrary system comma... 13.09 Applications
What is Pre-Account Takeover? Exploitations & Security Tips Pre-Account Takeover is a type of attack that we very often carry out during our audits. Although it is only possible in very specific situations, the... 12.09 Applications
What is RFI? Remote File Inclusion Exploitations and Security Tips Security vulnerabilities are a major risk for modern web applications, potentially exposing sensitive user data and corporate infrastructures to malic... 03.09 Applications
Exploring Email Change Vulnerabilities and Security Best Practices Whatever the web application, it is common practice to allow users to change their email address. This functionality is critical because it has a dire... 23.08 Applications
What are IoT Attack Vectors and Security Challenges? IoT security is a key issue for organisations. In all sectors and areas of activity (healthcare, industry, services, transport, energy, etc.), the IoT... 06.08 IoT
Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
What is Prototype Pollution? Exploitations and Security Tips Prototype pollution vulnerabilities are specific to JavaScript. They can be exploited on both the server and client sides. These vulnerabilities allow... 06.08 Applications