From 0 to pentesting hero
Every service that has a login mechanism should also have the option to reset the password. But how to do it right?
2 MIN READ
From 0 to pentesting hero
Every service that has a login mechanism should also have the option to reset the password. But how to do it right?
2 MIN READ
From 0 to pentesting hero
A popular opinion says to not use the pickle class on a data given by user because on deserialization it may lead to the object injection attack and malicious code execution.
2 MIN READ
From 0 to pentesting hero
We'll talk about template engines. This time we'll use Python as an example and Flask framework, in which we will use Jinja2.
2 MIN READ
From 0 to pentesting hero
Today we are going to see that the platform on which we run our programs makes a difference and we'll use PHP for this purpose.
2 MIN READ
From 0 to pentesting hero
This time, unusually - we are not going to look at a specific programming language but a Linux function - unzip - that is for extracting files.
2 MIN READ
From 0 to pentesting hero
Today we are going to search for some vulnerabilitis in the code responsible for XML parsing.
2 MIN READ
From 0 to pentesting hero
Today we are going to talk about Ruby language. We'll take a look at a simple implementation of the proxy server.
2 MIN READ
From 0 to pentesting hero
Today's example consists of 2 lines of python code, because usually it's enough to introduce a vulnerability to our application.
2 MIN READ
From 0 to pentesting hero
We are used to the fact that websites contain links to another web services. But, can automatic redirection to external domain be harmful?
09-04-2019
3 MIN READ