Embrace the Suck!
When handling customer support for PentesterLab, we often get emails from people who can’t solve a challenge:
“… I have been working on this challenge for the past 3 days and I really can’t get it to work.”
In every field, people eventually hit plateaux in their progression. Security code review is no…
JSON Web Tokens (JWT) are widely used for authentication in modern applications. As their use increases, so does the importance of understanding common attacks against them, such as algorithm confusion attacks. For a long…
Too often (me included), savvy code reviewers recommend to get started into code review by “Just reading…
After reading this blog post on a bug in Github and Unicode, I started playing more and more with Unicode (even bought two domains).
Recently, I had a Eureka moment while camping and started wondering: “what was the impact of those uppercase and lowercase…
If you follow PentesterLab on Twitter, you probably saw the following tweet:
In this short article, I’m going to discuss a little bit on the exploitability of CVE-2019–5420.
One of the questions I often get asked is whether or not I recommend going to university/engineering school/… or…
The HackIM 2018/NullCon CTF just wrapped up. PentesterLab wrote 3 challenges for this CTF: