Blog
Home / Blog

Introduction to OSINT
Technological breakthroughs have revolutionized the entire world into what, at present, is called the information age. One of the most important things about this age

IPV6 DNS Takeover
Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Active Directory Basics
The number of resources such as users, databases, or servers managed in organizations poses questions about accountability as firms adjust to industry needs and norms.

Blockchain 101
A blockchain is a shared distributed ledger between computer network nodes. It serves as an electronic database for storing data in digital form. Blockchain keeps

JWT Authentication Bypass
What are JWTs? JSON web tokens (JWTs) are a standardized format for sending cryptographically signed JSON data between systems. Theoretically, they can contain any kind

Insecure Deserialization in Java
Our previous blogs covered Insecure Deserialization in PHP and Python. In this blog (the third in our “Insecure Deserialization” series), we’ll take a glance at

Intro to Software Reverse Engineering (Part 3)
Hey everyone! In the previous blog (part 2 of the “Intro to Software Reverse Engineering”), we covered a walk-through of a challenge from crackmes.one. We’ll

Intro to Software Reverse Engineering (Part 2)
In our previous blog (part 1 of the “Intro to Software Reverse Engineering” series), we covered the basics of Reverse Engineering. In this blog (part

Insecure Deserialization in Python
In this blog (part of the “Insecure Deserialization” series), we are going to discuss Insecure Deserialization in Python. We briefly discussed “What is Serialization?” and

Intro to Software Reverse Engineering – Part 1
Software Reverse Engineering is the process through which one attempts to understand a program’s functionality by analyzing its code. In this blog (part 1 of

Insecure Deserialization in PHP
In this blog (part of the “Insecure Deserialization” series), we will discuss insecure deserialization vulnerabilities in PHP and its prevention. The purpose of data serialization

Sensitive Data Exposure in Local Storage IOS
In this blog, we are going to demonstrate how to examine and detect potential security risks in an iOS application based on a Local Data