Security Blog

Feature development & monitoring tips

Month: January 2020

January 27, 2020

Injection Attacks

Injection Attacks are 1st in the OWASP TOP 10 list of vulnerabilities, they are not limited to SQL Injections. Here we talk about different types of Injection Attacks.

Find Out More
January 10, 2020

Masquerade, cracking hashes with known formats

As a penetration tester, cracking hashes can be a great post exploitation activity for both the fun and value to a client, providing a great way of showing the severity of an issue (but mostly for the fun). In this blog I’ll show you an in-depth look at cracking hashes with known formats.

Find Out More