Security Papers & Presentations |
|
Showing 'Security Papers & Presentations' from 11 to 20 |
|
Open-source Application Security Flaws: What You Should Know And How To Spot Them 19th Oct 2020 [3 months ago] from InfoSec Introduction Open-source software helped to revolutionize the way that applications are built by professionals and enthusiasts alike. Being able to borrow a non-proprietary library to quickly prototype and build an application not only... |
Source 1: VulnHub CTF Walkthrough 15th Oct 2020 [3 months ago] from InfoSec In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named darkstar7471. Per the description given by the author, this is an entry-level CTF. The target of this CTF is to... |
How To Create A Subdomain Enumeration Toolkit 14th Oct 2020 [3 months ago] from InfoSec Introduction A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two... |
Japan’s IoT Scanning Project Looks For Vulnerable IoT Devices 14th Oct 2020 [3 months ago] from InfoSec The growing world of IoT — and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to expand at a healthy pace. Telecommunications... |
How To Find Weak Passwords In Your Organization’s Active Directory 14th Oct 2020 [3 months ago] from InfoSec Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There... |
Using Merlin Agents To Evade Detection 13th Oct 2020 [4 months ago] from InfoSec Introduction While penetration testing and Red Teaming are crucial to check a system’s security and to validate potential entry-points in the infrastructure, sometimes establishing an initial foothold on the target can be a big challenge... |
The Ultimate Guide To Encryption Key Management 13th Oct 2020 [4 months ago] from InfoSec Introduction In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encryption). The first step of preventive security is not encryption; however,... |
How Hackers Use CAPTCHA To Evade Automated Detection 13th Oct 2020 [4 months ago] from InfoSec Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA... |
Targeting The Node 12th Oct 2020 [4 months ago] from InfoSec Introduction to blockchain nodes HTTP and other web standards define how computers are supposed to communicate with one another, not the software that is used to implement these communications. Since all web servers and browsers follow... |
Proof Of Stake Consensus Algorithm Security 12th Oct 2020 [4 months ago] from InfoSec The need for consensus in blockchain Blockchain technology is designed to create a distributed, decentralized and immutable digital ledger. Each node in the blockchain network maintains its own copy of the distributed ledger and updates... |
|
« Newer 1 2 3 4 5 6 7 8 9 10 Older » |
|