Oded van KloeteninSSD Secure DisclosureRemote Code Execution: The Cybercriminal’s Golden TicketImagine a vulnerability so dangerous that an attacker can execute any command they want on your system from anywhere in the world. That’s…Oct 30Oct 30
Oded van KloeteninSSD Secure DisclosureMastering Local Privilege Escalation: How to Identify and Exploit System VulnerabilitiesLocal Privilege Escalation (LPE) refers to a type of vulnerability that allows an attacker with limited privileges (such as a regular user…Oct 10Oct 10
Oded van KloeteninSSD Secure DisclosureUnmasking XSS: How to Identify and Exploit Cross-Site Scripting VulnerabilitiesSep 26Sep 26
Oded van KloetenIdentify and Exploit Vulnerabilities in Routers: An Introductory Guide & Technical Case StudiesPART THREEAug 25Aug 25
Oded van KloetenIdentify and Exploit Vulnerabilities in Routers: An Introductory Guide & Technical Case StudiesPART TWOAug 18Aug 18
Oded van KloeteninSSD Secure DisclosureIdentify and Exploit Vulnerabilities in Routers: An Introductory Guide & Technical Case StudiesPART ONEAug 4Aug 4
Oded van KloetenBug Bounty Programs: Why it’s becoming a hassle and what you can do about itDisclosure and bug bounty programs could sometimes be a double-edged sword. These services could help you avoid the hassle of contacting a…Nov 14, 2022Nov 14, 2022
Oded van KloetenWhat’s a CTF and is it for you?Coding and programming competitions have been a part of cyber security gatherings and conventions for many years now, the first of which…Nov 14, 2022Nov 14, 2022
Oded van KloeteninSSD Secure DisclosureThe Community Lifeline: Building a Safer Cybersec CommunityThe rise of digital ecosystemsOct 22, 2020Oct 22, 2020
Oded van KloeteninSSD Secure DisclosureWhy I stopped chasing vendors and decided to get the credit and payout I deserve for my researchOver the past fifteen years, the act of disclosing vulnerabilities and bugs found in hardware and software, became mainstream.Jun 29, 2020Jun 29, 2020