Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 11 to 20
Open-source Application Security Flaws: What You Should Know And How To Spot Them
19th Oct 2020 [12 days ago] from InfoSec
Introduction Open-source software helped to revolutionize the way that applications are built by professionals and enthusiasts alike. Being able to borrow a non-proprietary library to quickly prototype and build an application not only...
Source 1: VulnHub CTF Walkthrough
15th Oct 2020 [16 days ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named darkstar7471. Per the description given by the author, this is an entry-level CTF. The target of this CTF is to...
How To Create A Subdomain Enumeration Toolkit
14th Oct 2020 [17 days ago] from InfoSec
Introduction A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two...
Japan’s IoT Scanning Project Looks For Vulnerable IoT Devices
14th Oct 2020 [17 days ago] from InfoSec
The growing world of IoT — and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to expand at a healthy pace. Telecommunications...
How To Find Weak Passwords In Your Organization’s Active Directory
14th Oct 2020 [17 days ago] from InfoSec
Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There...
Using Merlin Agents To Evade Detection
13th Oct 2020 [18 days ago] from InfoSec
Introduction While penetration testing and Red Teaming are crucial to check a system’s security and to validate potential entry-points in the infrastructure, sometimes establishing an initial foothold on the target can be a big challenge...
The Ultimate Guide To Encryption Key Management
13th Oct 2020 [18 days ago] from InfoSec
Introduction In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encryption). The first step of preventive security is not encryption; however,...
How Hackers Use CAPTCHA To Evade Automated Detection
13th Oct 2020 [18 days ago] from InfoSec
Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA...
Targeting The Node
12th Oct 2020 [19 days ago] from InfoSec
Introduction to blockchain nodes HTTP and other web standards define how computers are supposed to communicate with one another, not the software that is used to implement these communications. Since all web servers and browsers follow...
Proof Of Stake Consensus Algorithm Security
12th Oct 2020 [19 days ago] from InfoSec
The need for consensus in blockchain Blockchain technology is designed to create a distributed, decentralized and immutable digital ledger. Each node in the blockchain network maintains its own copy of the distributed ledger and updates...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »