PinnedThreeHeadedBeastSecurityinSystem WeaknessHarry Potter and Broken Access Control (OWASP Top 10) — Part 1Broken Access ControlNov 10, 2022Nov 10, 2022
PinnedThreeHeadedBeastSecurityHarry Potter and the Sorcerer’s Stone from a Cyber Security Perspective (Part 1)If you know me, you know that I love security and Harry Potter. In this post, I will reflect on Harry Potter and the Sorcerer’s stone from…Nov 2, 2022Nov 2, 2022
ThreeHeadedBeastSecurityHome Alone and Injection Attacks (OWASP Top 10)It’s the holiday season! Marv and Harry strike again. This time they decide to conduct a SQL injection attack on alarm companies to figure…Dec 9, 2022Dec 9, 2022
ThreeHeadedBeastSecurityinSystem WeaknessLion King and Cryptographic Failures (OWASP Top 10)What are Cryptographic Failures?Nov 24, 20221Nov 24, 20221
ThreeHeadedBeastSecurityinSystem WeaknessHarry Potter and Broken Access Control (OWASP Top 10) — Part 2In Part 1, we covered 2 types of Access Control and Privilege Escalation. These are horizontal & vertical.Nov 14, 2022Nov 14, 2022
ThreeHeadedBeastSecurityHarry Potter and the Sorcerer’s Stone from a Cyber Security Perspective (Part 2)Welcome to part 2 of the series :) . If you missed part 1, feel free to read it here !Nov 5, 2022Nov 5, 2022
ThreeHeadedBeastSecurity7 Cyber Security Concepts Explained to a 5 year old1. Defense in DepthFeb 9, 2019Feb 9, 2019
ThreeHeadedBeastSecurityThou Shall have Fun with CAN Traffic Analysis.This past summer, I had the opportunity to attend DEFCON’s Car Hacking Village.…Jan 28, 2019Jan 28, 2019
ThreeHeadedBeastSecurityI Went to My First DEFCON and I loved Every Minute!What is DEFCON?Aug 15, 2018Aug 15, 2018