A sequel to the last post of what is now becoming a series of “From Shodan to remote code execution”, we now take a look
Most of us got hold of the NSA exploits recently released to the public and there was so much hype and public statements around it.
Like any normal web application, Sharepoint may fall prey to OWASP Top 10 vulnerabilities with a special focus on XSS, mostly due to inadequate patching
So, I stumbled upon an interesting script. Over the years, I have been using various tools and scripts to do spear phishing; with the many
Interesting engagement I had a few weeks ago, a client wanted assurance on their ERP – Oracle E-Business suite, to be specific. I spent a
Post coming up…