Homepage
Open in app
Sign in
Get started
Security-aholic
Just a Blog about Computer Science, Security and Life
Security
Programming
Life
Donate
Follow
Deal with challenge exceptions in Linkedin API
Deal with challenge exceptions in Linkedin API
Calls from IP addresses that never logged in with the given account before will be blocked and required a verification.
Everping
Feb 13, 2020
Subdomain takeover — Chapter two: Azure Services
Subdomain takeover — Chapter two: Azure Services
As I described in the chapter one, we can control the content of a sub-domain d by controlling the content of its CNAME record
Everping
Aug 11, 2019
Subdomain takeover — Chapter one: Methodology
Subdomain takeover — Chapter one: Methodology
Subdomain takeover is a high severity vulnerability that can be exploited to take control of a domain and pointing it to an address managed
Everping
Aug 11, 2019
A python script get Alexa top sites
A python script get Alexa top sites
If you want to get top visited websites, Alexa is a reliable source. But, sadly, they only free the first 50 websites, and if you want to…
Everping
Feb 9, 2018
Using Remote Asset Bundle in Unity3D framework really safe?
Using Remote Asset Bundle in Unity3D framework really safe?
Introdution
Everping
Mar 3, 2017
Client Side Template Injection — Kipalog.com
Client Side Template Injection — Kipalog.com
Everping
Feb 17, 2017
Dirty Cow — CVE-2016-5195
Dirty Cow — CVE-2016-5195
Về Dirty Cow
Everping
Oct 28, 2016
How does HTTPS actually work?
How does HTTPS actually work?
What is HTTPS?
Everping
Oct 12, 2016
Pwn a bunch of servers via a Redis misconfiguration and the Shodan search engine
Pwn a bunch of servers via a Redis misconfiguration and the Shodan search engine
Recently, I had a chance to know more about Shodan search engine by reading the blog post of Sijmen Ruwhof. The post talks about how he…
giáp lê
Oct 12, 2016
About Security-aholic
Latest Stories
Archive
About Medium
Terms
Privacy
Teams