If you are reading this on your laptop or desktop pc, then probably your phone is laying just next to it. Maybe you even received some notifications while reading this email. Perhaps you checked yourself if there's anything new on the web? Statistics say that we...
#5
Everything about 2FA
With the number of password leaks in recent years, 2FA (2 Factor authentication) is implemented in more and more systems, of course, including those with bug bounty programs. There are quite a few things that can go wrong with implementing 2FA and you should...
Over 200 public pentest reports
Pentesting reports are usually confidential. If you do regular pentests, you know that your reports mustn't be shared with anyone. It's likely that you only saw reports from companies you worked in and you think that you just can't read other ones....
Free DNS tool
DNS protocol can be utilised for many different use cases: exploiting SSRF by DNS rebinding exploiting SSRF by multiple A records exfiltrating data when HTTP traffic is blocked even XSS! etc. However, setting up the DNS server for all that purposes is definitely not...