Open in app

Sign in

Medium Logo
Write

Sign in

Florian Walter
Florian Walter

478 followers

Home

About

How to Get Started with Secure Code Review

Since starting my secure code review challenges in December 2023 (https://github.com/dub-flow/secure-code-review-challenges), many people…

Mar 6
1
How to Get Started with Secure Code Review
How to Get Started with Secure Code Review
Mar 6
1

Session Token Security: Local Storage vs. Cookies

One of the discussions that keep coming up among cybersecurity professionals is where to store your session tokens for the most security…

Sep 3, 2024
2
Session Token Security: Local Storage vs. Cookies
Session Token Security: Local Storage vs. Cookies
Sep 3, 2024
2

Hacking Moodle Apps Via External Functions

So say you’re trying to hack an app that uses Moodle. You start by googling something like “hacking moodle” or “moodle common…

Jul 24, 2024
Hacking Moodle Apps Via External Functions
Hacking Moodle Apps Via External Functions
Jul 24, 2024

Hacking Large Language Models — A Case Study

In this article, I will show how I was able to “jailbreak” a language model and make it drop its “no I won’t do this” attitude entirely…

Jul 16, 2024
Hacking Large Language Models — A Case Study
Hacking Large Language Models — A Case Study
Jul 16, 2024

Subdomain Takeover: What is It? How to Exploit? How to Find Them?

In this article, we shed light on Subdomain Takeovers and discuss 3 things:

May 15, 2024
Subdomain Takeover: What is It? How to Exploit? How to Find Them?
Subdomain Takeover: What is It? How to Exploit? How to Find Them?
May 15, 2024

How Secure is Java’s SecureProcessing?

If you’ve ever worked with secure XML parsing in Java (to prevent XXE Injections), you probably have come across an XML parser flag named…

Mar 16, 2024
How Secure is Java’s SecureProcessing?
How Secure is Java’s SecureProcessing?
Mar 16, 2024

Found a Vulnerability? 3 Easy Steps to Submitting a CVE!

In my recent post, I talked about the methodology that I used to find most of my 25 CVEs (you can find this article here…

Feb 26, 2024
3
Found a Vulnerability? 3 Easy Steps to Submitting a CVE!
Found a Vulnerability? 3 Easy Steps to Submitting a CVE!
Feb 26, 2024
3

The Easiest Way to Find CVEs at the Moment? GitHub Dorks!

In this article, I will demonstrate how I used GitHub dorks to find 24 vulnerabilities in popular open-source projects in just a few weeks…

Feb 8, 2024
8
The Easiest Way to Find CVEs at the Moment? GitHub Dorks!
The Easiest Way to Find CVEs at the Moment? GitHub Dorks!
Feb 8, 2024
8

How I Became an Ethical Hacker

People often ask me how they can break into the field of cybersecurity (and, particularly, ethical hacking). I understand times are tough…

Dec 10, 2023
2
How I Became an Ethical Hacker
How I Became an Ethical Hacker
Dec 10, 2023
2

Predicting a “Random” Number

Have you ever looked at a code snippet that creates for example a password reset token or something, uses a non-cryptographically secure…

Nov 28, 2023
Predicting a “Random” Number
Predicting a “Random” Number
Nov 28, 2023
Florian Walter

Florian Walter

478 followers

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech