OUR BLOG
Intermediate Level Resources For Web Application Penetration Testing
Following the previous blogpost of this series regarding entry level resources for penetration testing, we are going to proceed with a list of referenced material focusing on web application penetration testing. Mainly, some handy Burp Extensions, resources for...
Smishing in the time of Covid-19
During the current pandemic the GSM network is used by the states around the globe for sending SMS notifications to the public. Due to a twenty-year-old issue that still plagues online SMS platforms, we believe that this is a first-class opportunity to raise awareness...
What is GDPR
This blogpost will try to explain in layman terms what is the GDPR and how can it affect your personal and professional life. The European General Data Protection Regulation (GDPR) is applicable as of May 25th, 2018 in all EU member states to harmonise data privacy...
GDPR vs CCPA 2020 edition
*There is an updated edition of this article that you can read here This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the California Consumer Privacy Act. The European General Data Protection Regulation...
A touch on CVE-2020-0796
Introduction In this post, we will aim to touch on the CVE-2020-0796 vulnerability, which was initially publicly disclosed by Microsoft. This post also attempts to illustrate basic windbg usage for dynamic vulnerability analysis. IDA disassembler will also be used in...
Entry level resources for penetration testing
This blog post is the first in a series of posts about the world of web app penetration testing. What you are reading now is but an introduction aiming to introduce the aspiring pentester to essential knowledge and tools. Although further articles addressed to more...