After a four-year wait, OWASP has released a draft of its new list of the most prevalent web application vulnerabilities.
Hacking Lethani
There have been no new posts in the last few weeks as I have been preparing for the CCSP. This is another one of the…
Today we are going to talk about one of the great protocols of the past: Internet Relay Chat, the prototype for instant messaging. Although those…
Today we are going to talk about a very special encryption system. Although this type of encryption has been proposed for a long time (it…
BGP Hijacking This article is a continuation of the last post on the BGP protocol. If you haven’t read it yet, do so before you…
Today we are going to talk about everything related to SNMP (Simple Network Management Protocol) security. This is a network management service that runs on…
On this post we are going to talk about how to get the most out of Remote Procedure Call, a protocol that is integrated in…
This is the second part of the post about the DNS protocol and its vulnerabilities. If you have not yet read the first part, I…
Do you know what happens from the moment you enter a URL in your browser until you get the results? Learn about the weaknesses of the DNS protocol and find out how to exploit them.