There’s a lot of cool stuff going on in this challenge. Double file extension upload vulnerabilities, type juggling, magic hashes and frame buffer dumping just
To make a mistake is human. To make 1000 mistakes at once is DevOps
There’s a lot of cool stuff going on in this challenge. Double file extension upload vulnerabilities, type juggling, magic hashes and frame buffer dumping just
This challenge sees a user shell obtained by exfiltrating sensitive information via a vulnerability called Heartbleed in the OpenSSL cryptography library; which is a widely
Aragog was a delightful challenge on HackTheBox. It’s up there with one of my favourites so far! To complete this box, I was able to
Image upload forms on websites are just for pictures of your cats, right? In this post, I demonstrate how to identify a data validation vulnerability
Patching your operating system isn’t enough. You need to patch your third-party applications too as they can contain vulnerabilities such as buffer overflows that allow
Jeeves demonstrates the seriousness of securing access to applications, and the importance of practising good password hygiene. First, I take advantage of broken access controls