Blog

Home / Blog

Purdue Model for OT Security

Purdue Model for OT Security

What is OT Security? Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial

Read More »
Hacking Electron Apps

Hacking Electron Apps

zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because node Integration in webPreferences is true). Electron Applications Electron is

Read More »
Vlan Hopping

Vlan Hopping

Introduction to VLAN Virtual LAN is a logical method of grouping Layer-2 switchports on a local switch into different broadcast domains. VLANs can help to

Read More »
Why do we need a Web App Pentest

Why do we need a Web App Pen test

Vulnerability assessments use automation to routinely scan for routers, firewalls, servers, applications, and switches. Web application penetration testing has a limited scope. A web application

Read More »