PinnedJeroen VerhaegheinSystem WeaknessAdvanced Directory Traversal attacks and remediation against windowsDifferent advanced attacks against windowsAug 4, 2023Aug 4, 2023
Jeroen VerhaegheCopy a MiFare classic card with the proxmark3 easyMiFare is a type of contactless smart card technology developed by NXP Semiconductors. These cards use radio frequencies to communicate…1d ago1d ago
Jeroen VerhaegheLoad performance testing GraphQL with k6Grafana k6 is an open-source load testing tool that makes performance testing easy and productive for engineering teams. At the moment K6…1d ago1d ago
Jeroen VerhaegheAttacks and Threats Against Large Language Models (LLMs)How susceptible are AI models to hacking, and what are the primary threats associated with the new AI revolution? Moreover, how can we…May 4May 4
Jeroen VerhaegheKeeping Microsoft Teams always appear onlineMicrosoft Teams is a chat application by Microsoft. When the device is unattended for several seconds a user is set to be not available in…May 1May 1
Jeroen VerhaegheHands-on introduction to OSINTOSINT stands for Open Source Intelligence. It’s the practice of collecting and analyzing information from publicly available sources to…Apr 20Apr 20
Jeroen VerhaegheScan uploaded files for malware in .net coreHow can we validate and verify that upload files aren’t a threat to the system or the users?Apr 7Apr 7
Jeroen VerhaegheHands-on unauthenticated Bluetooth keyboard attack(CVE-2024–0230)In the beginning of 2024 a new Bluetooth exploit was exposed. This exploitation allowed an attacker to attach a keyboard to a device…Mar 6Mar 6
Jeroen VerhaegheMake your application GDPR-compliantGDPR stands for General Data Protection Regulation. It’s a comprehensive data privacy regulation enacted by the European Union (EU) to…Feb 16Feb 16