collection-placeholder.jpeg

Hacking Web Apps

Article cover image
May 7, 2021

Web applications are ubiquitous in the modern online world, and knowing how to attack them is an increasingly valuable skill. But the key to a success ...

Article cover image
Nov 30, 2020

Withstanding an attack from a motivated hacker is one of the most important responsibilities a system administrator must undertake. This is especially ...

Article cover image
Nov 7, 2020

One of the most promising avenues of attack in a web application is the file upload. With results ranging from XSS to full-blown code execution, file ...

Article cover image
Oct 8, 2020

Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous login ...

Article cover image
Sep 25, 2020

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on the ...

Article cover image
May 18, 2020

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available ...

Article cover image
May 8, 2020

People use browsers for all types of things, and in general, we trust a lot of personal information to them. That's why browsers are a perfect attack ...

Article cover image
May 6, 2020

Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of these apps are HTTP request ...

Article cover image
Jan 30, 2020

Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and exe ...

Article cover image
Jan 7, 2020

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces sh ...