#5

Everything about 2FA

With the number of password leaks in recent years, 2FA (2 Factor authentication) is implemented in more and more systems, of course, including those with bug bounty programs. There are quite a few things that can go wrong with implementing 2FA and you should...

Over 200 public pentest reports

Pentesting reports are usually confidential. If you do regular pentests, you know that your reports mustn't be shared with anyone. It's likely that you only saw reports from companies you worked in and you think that you just can't read other ones....

Free DNS tool

DNS protocol can be utilised for many different use cases: exploiting SSRF by DNS rebinding exploiting SSRF by multiple A records exfiltrating data when HTTP traffic is blocked even XSS! etc. However, setting up the DNS server for all that purposes is definitely not...