Category: security

0

State of the art of network pivoting in 2019

Disclaimer# This an english translation of an article I wrote in french on Orange Cyberdefense blog. Introduction: what is pivoting?# Penetration testers are often required to cross network boundaries

0

flAWS training complementary solution

Disclaimer This document is not a write-up or a standalone solution to flAWS training but a complementary solution in order to add more details or alternative ways to solve some steps compared to the

0

Disable clipboard events override

Everyone encountered at least once a form that ask you to confirm your password or email address to check you didn't make some mistake when re-typing it. But it's not rare at all to have those websi

0

Check SSH fingerprint

Display the default fingerprint# Of a key# You can either use the public key or private key to obtain the fingerprint (default is SHA256 in base64). 1234$ ssh-keygen -lf ./id_ed25519256 SHA256:jI

0

Types of SQL Injection

SQL Injection, also known as SQLi, is one of the most common vulnerabilities in web application. Goal of the article# The goal of this article is not to explain what is an SQL injection or how they wo