Breaking Reverse Proxy Parser Logic Security researcher Blake Jacobs teaches us how to break reverse proxy parser logic to redirect server traffic.
How Copy Pasting Can Get You Hacked Ctrl C + Ctrl V is an unsung hero to every programmer and sysadmin out there and an elementary and universal keyboard combination integrated into the core of every OS ecosystem. I have used it as second nature, and you have too. Nothing to see here? Or so it seems. An
OSINT OSINT Bites 1 - Architecture Part 1 of our OSINT Bites Collection focuses on architecture and the role it plays in geolocation.
TECHNICAL Funny Deadly Linux Strings Part 2 Security researcher Patrick Hoogeveen returns with part two of his series on deadly little Linux strings.
INFOSEC We Are All Hacktivists Now Our adversaries allow cybercrime groups to flourish within their borders, while we demonize our hacker communities.
TECHNICAL HTB Devzat Walkthrough A technical walk through of the HackTheBox DEVZAT challenge, by Andy From Italy.
TECHNICAL HTB Driver Walkthrough A technical walk through of the HackTheBox DRIVER challenge, by Andy From Italy.
INFOSEC The CIA Triad The CIA Triad may sound like an unholy alliance of the CIA and Chinese gangsters, but is actually good practice.
TECHNICAL Funny Deadly Linux Strings Security researcher x0xr00t Likes to play around with funny encoding strings that execute directly after decrypt.
INFOSEC Legality & The IT Army Of Ukraine Hundreds of thousands of infosec professionals signed up for cyberwar without realizing it might make them cyber combatants.
INFOSEC DeTy: A Website For The Missing People Of Ukraine De Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.
CYBERSEC Featured Advice for Ukrainians Cyber warfare is not to be taken lightly especially for the Ukrainians! A good samaritan security researcher gives valuable advice to the Ukranian people on how they can stay safe on the internet!
INFOSEC Secjuice Squeeze 77 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL HTB Horizontall Walkthrough Another Hack The Box walkthrough, but this time Andy From Italy explains how we can exploit the Horizontall machine with Laravel and remote code execution!
INFOSEC Security Should Start with the Involvement of Top Management Security researcher Alesanco explains why top management in an organization plays an important role in security, and how an organization can secure its assets by assessing risks and having a Business Continuity Plan (BCP) in place... and much much more.
INFOSEC Log4Shell Explained to Your Non-Technical Friend Security researcher Andrea Barracu explains how the Log4Shell vulnerability works in a digestible manner for those who are non-technical and still want to grasp an understanding of it.
INFOSEC Threat Intelligence: Intelligence Requirement Intelligence requirement (IR) is an important component of threat intelligence.
INFOSEC Secjuice Squeeze 76 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL HTB Forge Walkthrough Andy From Italy uncovers how he escalated privileges, gained secret passwords, utilized the pdb Python debugger - and much more - with another incredible Hack The Box walkthrough!
INFOSEC Featured Secjuice Squeeze 75 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL HTB Previse Walkthrough Andy From Italy gives us a fantastic HTB walkthrough exploiting the mySQL database on the Previse BOX!
INFOSEC Secjuice 2021 Writer of the Year Winner: Andy From Italy The 2021 Secjuice Writer of the Year award goes to our Hack The Box write-up legend, the one and only–Andy From Italy!
TECHNICAL TryHackMe Mr. Robot CTF Writeup Gurkirat Singh publishes his final write-up for 2021 on the TryHackMe Mr. Robot CTF, and demonstrates how to get root access into the Mr. Robot room and more!
INFOSEC On Writing Better Ross Moore provides us an excellent guide filled with timeless advice on how to write better for infosec (and in general too), even if English isn't your first language!
TECHNICAL TryHackMe Bounty Hacker Write-up Gurkirat Singh pushes out another one of his final TryHackMe write-ups for the year 2021 based on the room called Bounty Hacker! He shares how you can exploit the sudo misconfiguration when there's a password reusable vulnerability in the system and more!