Avatar
🗣️

Organizations

Popular posts

  1. Let’s take a look at the most common OAuth2 misconfigurations that can lead to vulnerabilities
    Author: Luca FamĂ 

    oauth misconfigurations authorization csrf

  2. Exploring security risks in a ‘Secure by Design’ and modern transport protocol
    Author: Luca FamĂ 

    QUIC HTTP/3 protocol impersonation DNS

  3. Legit features often turn into something unexpected: an Insomni’hack Teaser 2024 challenge writeup
    Author: Cesare Pizzi

    Reverse engineering ctf dot net R2R

  4. RSA is an old but still secure public-key cryptosystem. However we need to know how it works to avoid mistakes that could introduce vulnerabilities..
    Author: Luca FamĂ 

    rsa crypto math

  5. Inside the Hex-Rays CTF Challenge and the “mysteries” of RSA
    Author: Cesare Pizzi

    ctf reversing crypto rsa

  6. How HTTP/2 capabilities can be used to uncover Web race conditions
    Author: Luca FamĂ 

    web race condition http wireshark burp

Post activity