How to integrate IT security in a company, or: The five pillars of IT security 10/05/20 by Goetz Markgraf Let’s face it: Every company’s IT infrastructure can and will be the target of hacking. It is not a question of if it will happen, it is a question of when and how. Read more Leave your thoughts
Gamified security with hackthebox.eu: DevOops 04/01/20 by Martin Riedel Today we’re going to learn how to hack our way into the DevOops machine at hackthebox. If you want to... Read more Leave your thoughts
Gamified security with hackthebox.eu 03/26/20 by Martin Riedel At current (quaran)times, with all our staff in remote working environments, it’s fairly hard for us infosec people to get... Read more Leave your thoughts
Web server to shell bridge using Node.js 09/19/19 by Terry Wahl Everything is a web application nowadays. We’re moving everything to the cloud. The ecosystem for web libraries and frameworks is... Read more Leave your thoughts
Web application vulnerabilities and how to prevent them 02/05/19 by Jan Martijn Roetman I’ve noticed developers worry about web application vulnerabilities. I also think most of them try to do their best to prevent any problems. Read more Leave your thoughts
Penetration Test Training – Quaoar 12/05/17 by Martin Riedel For anyone interestend in penetration testing, Capture the Flag challenges are a great way to test your skills and learn something new. This is a write-up that guides you through the Quaoar Challenge. Read more Leave your thoughts
Penetration Test Training – LazySysAdmin 11/13/17 by Kevin Wennemuth and Martin Riedel For our Penetration Test Training, we’re going to start out training session with a fairly decent image from vulnhub.com – LazySysAdmin: 1. Read more Leave your thoughts