State of the art of network pivoting in 2019
Disclaimer# This an english translation of an article I wrote in french on Orange Cyberdefense blog. Introduction: what is pivoting?# Penetration testers are often required to cross network boundaries
Disclaimer# This an english translation of an article I wrote in french on Orange Cyberdefense blog. Introduction: what is pivoting?# Penetration testers are often required to cross network boundaries
Why?# A lot web-focused hacking/pentest tools have the ability to choose a user-agent (UA) to send while fuzzing/scanning/enumerating or at least to send custom HTTP headers. By default most of the to
Disclaimer This document is not a write-up or a standalone solution to flAWS training but a complementary solution in order to add more details or alternative ways to solve some steps compared to the
If we read Java - Better font rendering on ArchLinux wiki we can read this: Both closed source and open source implementations of Java are known to have improperly implemented anti-aliasing of fonts.
Everyone encountered at least once a form that ask you to confirm your password or email address to check you didn't make some mistake when re-typing it. But it's not rare at all to have those websi
Intro# When doing penetration testing using a black box approach, you may find a SQL injection (SLQi) by fuzzing with common payloads. Except if there is a verbose error disclosing the original SQL qu
Display the default fingerprint# Of a key# You can either use the public key or private key to obtain the fingerprint (default is SHA256 in base64). 1234$ ssh-keygen -lf ./id_ed25519256 SHA256:jI
Disclaimer# This post describes how to block automated scanners from scanning a website. Requirements# You will need: fail2ban nginx (another web server can work too but this will need some modificat
SQL Injection, also known as SQLi, is one of the most common vulnerabilities in web application. Goal of the article# The goal of this article is not to explain what is an SQL injection or how they wo
We will setup a client side certificate authentication in Nginx with Elliptic curve cryptography using ECDSA (curve secp384r1) for certificates and a self signed Certificate Authority (CA). Create Ser