Bryan MatthewinMII Cyber Security Consulting ServicesThick Client App Pentest: Discover a More Versatile Traffic Interception ToolHello everybody, in this post I want to talk about a versatile traffic interception tool that is suitable for your next thick client…Sep 19Sep 19
Bryan MatthewinMII Cyber Security Consulting ServicesHunting for Hidden Parameters in Burp SuiteLet me start this post by prefacing a bold statement:Feb 262Feb 262
Bryan MatthewinMII Cyber Security Consulting ServicesHow I Bypassed CSRF Token — 2 WaysPada kesempatan kali ini, saya ingin sharing bagaimana saya bisa membypass pertahanan CSRF pada sebuah website dengan 2 cara berbeda.Jan 20Jan 20
Bryan MatthewA Hands-On Introduction to Nessus: Basic Network Scan on a Windows 10 MachineHello everyone, in this post, you’re going to learn how to use Nessus to do a basic network scan on a vulnerable Windows 10 machine. I’m…Aug 11, 2023Aug 11, 2023
Bryan MatthewHow to Setup (Vulnerable) Windows 10 VM Lab for HackingI always love the saying:Aug 10, 2023Aug 10, 2023
Bryan MatthewDetecting DDOS Attacks and Port Scanning with SnortIn this write-up, I want to demonstrate how attackers use Hping3 to perform various types of DDOS attacks (Land, SYN Flood, Smurf, and UDP…Aug 8, 2023Aug 8, 2023