After having watched my colleague Michael pay the beer after Daniel’s rubber ducky attack, I wanted in on the fun! So, our systems at OKIOK are pretty well secured, an outsider, let’s call him [...]
All pen testers use the Burp suite at some point, but few really exploit it to its full potential. One of the most extraordinary features of Burp is the ability to write your own custom handler. [...]
When performing penetration testing, sqlmap can be used to have a granular control of the various injection points during a SQL injection. For example, the HTTP Cookie header, the HTTP Referer [...]