-
Exploring security risks in a ‘Secure by Design’ and modern transport protocol
-
Legit features often turn into something unexpected: an Insomni’hack Teaser 2024 challenge writeup
-
RSA is an old but still secure public-key cryptosystem. However we need to know how it works to avoid mistakes that could introduce vulnerabilities..
-
Inside the Hex-Rays CTF Challenge and the “mysteries” of RSA
-
How HTTP/2 capabilities can be used to uncover Web race conditions
-
Using semgrep to write custom SAST rules and prevent vulnerabilities in your code
-
Playing CTF competitions to learn new stuff and discover hidden and powerful features
-
How an image compression feature can lead to XSS
-
A CTF writeup about solving 6 challenges in 5 minutes
-
A basic introduction to Java insecure deserialization and and how attackers can exploit this vulnerability to get RCE