Testing an API for hackers
Leading on from the prev article - An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with…
Leading on from the prev article - An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with…
Enumerating subdomain when performing recon (or asset identification) is a task that you will (and should) perform regularly. Methods ScrapingBrute-forceAlterations & permutations of already known subdomains Online DNS tools spyse…
The following is an article written by an ai chat bot, I asked it the following: please write 500 words about general cyber security practices. First, Ill provide the text…
nc netcat opening listening ports - Netcat scan examples. Netcat (often abbreviated as nc) is a versatile command-line utility used for managing network connections. Known as the "Swiss army knife"…
zmap is an opensource network scanner, most often used to scan whole external internet networks in this tutorial I'll show you how to run zmap on a local network. One…
Investigating uPNP with python for fun and profit. SSDP is an interesting uPNP protocol - devices advertise their capabilities on the network and leak valuable information. SSDP is very similar…
MetaSploit tutorial for beginners This MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it before. It assumes…
What is an API (Introduction to APIs) Carrying on from my previous posts on SOA here and here I thought it may be useful to write a post on what…
300 word summary: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. Provides a valuable background section on the countermeasures for SQL injection attacks: Defensive ProgrammingGeneral Techniques against SQLiStatic Analysis techniques…