Blog
Home / Blog

NGINX Zero-Day Vulnerability 1
NGINX Zero-Day Vulnerability April 15, 2022 Web Application Redfox Security Team What is NGINX ? NGNIX is an open-source web server that can also act

Benefits of Penetration Testing
Benefits of Penetration Testing April 14, 2022 Informational Karan Patel Synopsis Breaking into a company’s security defenses takes a long time and skill. However, modern

Wifi Hacking (Pt.1)
Wifi Hacking (Pt.1) April 13, 2022 Wireless Network Redfox Security Team Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves.

Spring4Shell Vulnerability
Spring4Shell Vulnerability April 13, 2022 Web Application Redfox Security Team Synopsis A sequence of Tweets (that are now deleted) from a Chinese Twitter account was

Hacking GraphQL (Part 3)
Hacking GraphQL (Part 3) April 09, 2022 Web Application Tarak Sakhardande In Part 2 of the Hacking GraphQL series, we discussed the GraphQL DoS attack.

Server-Side Request Forgery
Server-Side Request Forgery April 07, 2022 Web Application Tarak Sakhardande SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of

Antivirus Evasion (Part 2)
Antivirus Evasion (Part 2) April 06, 2022 Red Team Redfox Security Team In Part 1 of our Antivirus Evasion series, we managed to get a

Hacking GraphQL Part 2
Hacking GraphQL Part 2 April 05, 2022 Web Application Tarak Sakhardande In part 1 of the Hacking GraphQL series, we discussed about the basics of

No SQL Injection
No SQL Injection April 03, 2022 Web Application Redfox Security Team NoSQL Injection refers to cyber-attacks that inject malicious payloads into non-SQL databases like MongoDB.

Antivirus Evasion (Part 1)
Antivirus Evasion (Part 1) April 02, 2022 Red Team Redfox Security Team Antivirus Evasion in general use signature-based and heuristics-based malware detection mechanisms. In this

Hacking GraphQL Part 1
Hacking GraphQL Part 1 March 25, 2022 Web Application Tarak Sakhardande GraphQL is quickly becoming the alternative to REST API, being able to request a