Join us

heart Posts from the community tagged with cybersecurity...
Sponsored Link FAUN Team
@faun shared a link, 1 year ago

Read Python Weekly

Python Weekly Newsletter, Pydo. Curated Python news, tutorials, tools and more! 

Join thousands of other readers, 100% free, unsubscribe anytime.

Story
@tutorialboy24 shared a post, 1 year, 6 months ago
tut

Spring Actuator - Stealing Secrets Using Spring Actuators - Part 1:

Spring is a set of frameworks for developing Applications in Java. It is widely used, and so it is not unusual to encounter it during a security audit or penetration test. One of its features that I recently encountered during a Whitebox audit is actuators. In this series of articles, I will use the..

Blue Sky Photocentric Youtube Channel Art.png
Story
@tutorialboy24 shared a post, 1 year, 6 months ago
tut

Turning cookie based XSS into account takeover

EpilogueI reported the exploitation scenario and was rewarded €500, as the impact was high. Be patient, don’t give up, and think out of the box. In this case, I used the company’s service to exploit the bug.Source :- https://tutorialboy24.blogspot.com/2022/09/turning-cookie-based-xss-into-account.ht..

xss.png
Story
@tutorialboy24 shared a post, 1 year, 6 months ago
tut

Exploiting Amazon Simple Notification Service Improper Validation of SigningCertUrl

IntroductionCountless applications rely on Amazon Web Services’ Simple Notification Service for application-to-application communication such as webhooks and callbacks. To verify the authenticity of these messages, these projects use certificate-based signature validation based on the SigningCertURL..

v (1).png
Story
@tutorialboy24 shared a post, 1 year, 7 months ago
tut

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

IntroductionAs a representative of cloud-native management and orchestration systems, Kubernetes (K8S for short) is receiving more and more attention. A report [1] shows that 96% of organizations are using or evaluating K8S, and its market share in production environments is Visible.The functions of..

k8s
Story
@anasnasim12 shared a post, 1 year, 10 months ago
Student

Machine Learning for Cybersecurity

Everything about Machine Learning for Cybersecurity and in-between.

ML for CS