Injected #3: Lethal SSRF — Advanced Exploitation SeriesServer-Side Request Forgery (SSRF) is rarely sexy on its own — it’s “just” a server fetching a URL. But when that fetch can reach internal…Nov 8Nov 8
Injected #2: Lessons from Hacking a Financial CompanyLast week we heard about a massive breach of RedHat, leading provider of enterprise open source solutions which provides many IT and…Oct 24Oct 24
Injected #1: From API Bugs To File Impersonation AttackHi hackers!Oct 16A response icon1Oct 16A response icon1
Hunting For Vulnerable SSRF MitigationsDuring my daily work, I love from time to time make a side quest to search for vulnerabilities in different software, especially open…Oct 7Oct 7
Do It Yourself — One Weekend, 2 CVEsI created a YouTube video to share some of my methodology for security research. This approach has consistently helped me discover…Aug 31Aug 31
Published inInfoSec Write-upsInside the Enemy Lines: How a Simple IDOR Unmasked a Major Malware CampaignThere are many different cybercrime services that are available for anyone who want to use them for malicious purposes. One of those…May 10May 10
Published inSystem WeaknessWhat We Learned From Salt Typhoon Telecom’s OperationRecently CrownStrike released a report about a big operation of the Chinese threat actor on telecom companies. But this operation wasn’t…Dec 13, 2024A response icon2Dec 13, 2024A response icon2
Published inInfoSec Write-ups5 Ways I Got RCE’s In the WildFor offensive security professionals, finding RCE vulnerabilities is usually a crown jewel for many black-box and white-box projects. These…Dec 7, 2024A response icon4Dec 7, 2024A response icon4
Published inInfoSec Write-upsFrom File Upload To LFI: A Journey To ExploitationRecently I had a client that asked for a black-box pentest for a new web app that the company was about to release. The objective of this…Dec 2, 2024A response icon3Dec 2, 2024A response icon3
5 Side Hustles For Ethical HackersAs the offensive cyber roles (pentesters, red teamers, security researchers and more) are considered to be well paid jobs, ethical hackers…Nov 30, 2024A response icon1Nov 30, 2024A response icon1