Laur Telliskivi5 ways to elevate —Learnings from eksclustergamesWhat can possibly go wrong when an adversary has hacked into your low-privileged AWS EKS pod running one of your application services? EKS…Jan 12Jan 12
Laur TelliskiviSnyk CTF 2023 writeup: BedsheetsI had the opportunity to take part in Snyk’s 2023 Fetch the Flag competition with my awesome colleagues. We had a lot of fun solving these…Nov 1, 2023Nov 1, 2023
Laur TelliskiviCircular fragment exploitation in GraphQL with BurpSuiteHaving managed multiple bug bounty programs over the years as a security engineer, I have seen all kinds of bugs submitted, mostly all…Oct 23, 2023Oct 23, 2023
Laur TelliskiviinAxel Springer TechIntigriti code challenge — World of ContextsI came across this interesting code challenge by Intigriti. If you don’t already follow them in the X app (formerly Twitter) then you…Oct 9, 2023Oct 9, 2023
Laur TelliskiviinAxel Springer TechDecomposing a common phishing attackAccording to CISA, 90% of successful cyber attacks start when you click an unfamiliar link or attachment. For those who are not familiar…Oct 1, 2023Oct 1, 2023
Laur TelliskiviBlackfield — abusing Windows privilegesIf you are into cyber security and don’t know HackTheBox (HTB) platform, GET ON IT! It is a fantastic learning tool for getting hands-on…Sep 23, 2020Sep 23, 2020
Laur TelliskiviAnalysis of a phishing emailAs the whole world has become more used to working from home due to COVID-19, it is only natural to have cyber attackers focus more on…Jul 20, 20201Jul 20, 20201
Laur TelliskiviTL;DR — I passed my OSCP exam!I am proud to announce that I passed my Offensive Security Certified (OSCP) exam on my first try!!! I can’t still believe it as it was the…Jan 30, 2020Jan 30, 2020
Laur TelliskiviPentesting basics: Cookie Grabber (XSS)In 2017, injection (attack) was identified by OWASP as the most serious web application security risk for a broad array of organizations…Oct 25, 2018Oct 25, 2018