Laur Telliskivi5 ways to elevate —Learnings from eksclustergamesWhat can possibly go wrong when an adversary has hacked into your low-privileged AWS EKS pod running one of your application services? EKS…9 min read·Jan 12, 2024----
Laur TelliskiviSnyk CTF 2023 writeup: BedsheetsI had the opportunity to take part in Snyk’s 2023 Fetch the Flag competition with my awesome colleagues. We had a lot of fun solving these…7 min read·Nov 1, 2023----
Laur TelliskiviCircular fragment exploitation in GraphQL with BurpSuiteHaving managed multiple bug bounty programs over the years as a security engineer, I have seen all kinds of bugs submitted, mostly all…4 min read·Oct 23, 2023----
Laur TelliskiviinAxel Springer TechIntigriti code challenge — World of ContextsI came across this interesting code challenge by Intigriti. If you don’t already follow them in the X app (formerly Twitter) then you…5 min read·Oct 9, 2023----
Laur TelliskiviinAxel Springer TechDecomposing a common phishing attackAccording to CISA, 90% of successful cyber attacks start when you click an unfamiliar link or attachment. For those who are not familiar…8 min read·Oct 1, 2023----
Laur TelliskiviBlackfield — abusing Windows privilegesIf you are into cyber security and don’t know HackTheBox (HTB) platform, GET ON IT! It is a fantastic learning tool for getting hands-on…9 min read·Sep 23, 2020----
Laur TelliskiviAnalysis of a phishing emailAs the whole world has become more used to working from home due to COVID-19, it is only natural to have cyber attackers focus more on…9 min read·Jul 20, 2020--1--1
Laur TelliskiviTL;DR — I passed my OSCP exam!I am proud to announce that I passed my Offensive Security Certified (OSCP) exam on my first try!!! I can’t still believe it as it was the…4 min read·Jan 30, 2020----
Laur TelliskiviPentesting basics: Cookie Grabber (XSS)In 2017, injection (attack) was identified by OWASP as the most serious web application security risk for a broad array of organizations…6 min read·Oct 25, 2018----