Below you can find a list of our blog posts relating to cybersecurity research:
- utilizing .htaccess for exploitation purposes
- Exploiting SWF’s – a guide to XSF and Flash Hacking
- An overview of obscure spear-phishing techniques
- SSH Shenanigans: the good, the bad, and the ugly
- Winning the race: Signals, symlinks, and TOC/TOU
- A beginners guide to bug bounty
- Remote NTLM relaying techniques
- Wrecking WAF’s with Command Injection tricks
- The security triangle
- A tale of eBay XSS and shoddy incident response
- Hacking banks for fun and profit
- Military security? Sub-par
- Non-conventional WAF/IDS evasion techniques