OUR BLOG
Greek Cyber Security Challenge Write-Ups 2016 part 1: Gavriil Reverse Engineering
Category: Reverse Engineering Note: You can download the Reverse Engineering Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
Pentesting Java Thick Clients using Burp and JDSer-DComp
Every now and then during our penetration tests, we come across a Java Thick Client application which uses HTTP to communicate with a server. This allows us, of course, to intercept and manipulate requests/responses using one of our favorite tools, Burp suite. Java...
ECSC 2016 Greece CTF writeup series – Intro
In 2016, it was the first time that Greece participated in the European Cyber Security Challenge (ECSC 2016), organized by ENISA. The formation, training and coaching of the Greek National CyberSecurity team was a purely community-driven event, organized by TwelveSec...
GDPR heads-up
Introduction Unless you have been living in a cave, you most probably have heard about the General Data Protection Regulation (GDPR) fuzz. Even worse, you might be responsible for actually implementing GDPR in your company/organization. Although the fines and...
Authorization Token manipulation using Burp Suite extender
Unsubscribe Technologies Security Study
From the beginning of the Internet, sending of junk email has been prohibited. Gary Thuerk sent the first email Spam message in 1978 to 600 people. A few decades later the European Union came to regulate this issue permanently with EU Directive 2002/58/EC, 1 year...