Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th…
Penetration testing is a race against the clock. Often, we only have a few days to examine all the functionality…
Today I wanted to continue the series on using LD_PRELOAD. In today’s post we are going to use LD_PRELOAD to…
A little background… As I stood in front of a class of developers trying to explain cross-origin resource sharing (CORS),…
Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…
Introduction While penetration testing and Red Teaming are crucial to check a system’s security and to validate potential entry-points in…
Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things. …
The Sophos XG Firewall vulnerability The Sophos XG Firewall recently had a publicly-reported zero-day vulnerability. The vulnerability in question was…
This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test.
Why Bother with Video Game Security? Video games are more than just entertainment. Gaming is a massive industry which by…