BSides Transylvania Is Not A Simple Conference, Is a Training Ground For Your Security TeamAs a leader in the IT industry, you know how critical it is to have a skilled and constantly evolving cybersecurity team. In today’s…Mar 8, 2024Mar 8, 2024
What to expect from BSides Transylvania 2024Yes, we are doing a security conference this year in Romania, BSides Transylvania! Yes, we are “all-in” to make it one of the best.Jan 31, 2024Jan 31, 2024
Bypass Canary Tokens for Monitored CommandsThrough this article, we will explore a simple but creative method to bypass the Canary Tokens that are configured to alert when a specific…Apr 2, 2023Apr 2, 2023
Bypass Windows DefenderIn this article, we will bypass Windows Defender (the latest version), explaining each step in detail.Jul 28, 20225Jul 28, 20225
How to Bypass 2FA/MFA with PhishingIn this article, we will discuss how you can bypass Multi-Factor Authentication (MFA) in a Phishing attack, to takeover accounts.Jul 20, 20221Jul 20, 20221
BadUSB 101In this article, we will discuss BadUSB, how to program it, and some offensive tricks of delivering it.Jun 2, 20222Jun 2, 20222
Methods to Exploit HTML InjectionIn this article, we will discuss the HTML Injection vulnerability, and 3 methods of how to creatively leverage it for exploitation.May 18, 20223May 18, 20223
Tips for Offensive Security Experienced Penetration Tester (OSEP) CertificationThis exam makes OSCP seem ridiculously easy.Apr 15, 20222Apr 15, 20222
Top 25 Subdomain Takeover Bug Bounty ReportsIn this article, we will discuss the Subdomain Takeover attack, and present 25 disclosed reports based on this flaw.Mar 15, 20221Mar 15, 20221
OSINT Tips for Penetration TestingIn this article, we will discuss some of my favorite OSINT techniques that can help during your penetration testing activities.Feb 1, 2022Feb 1, 2022
Top 25 Server-Side Request Forgery (SSRF) Bug Bounty ReportsIn this article, we will discuss the Server-Side Request Forgery (SSRF) vulnerability, and present 25 disclosed reports based on this flaw.Jan 19, 2022Jan 19, 2022
How to attack Offensive Security Web Expert (OSWE)In this article, we will discuss about one of the toughest exams from Offensive Security, the web expert one (OSWE).Jan 12, 2022Jan 12, 2022
Password Policy Best PracticesIn this article, we will discuss some “uncommon” password policy best practices, that are not followed by a lot of companies. Those are…Oct 15, 2021Oct 15, 2021
How to understand us, the PentestersCompanies and organizations are lacking a lot of understanding of how a pentester or ethical hacker is working to provide the best results…Oct 4, 20211Oct 4, 20211
Top 25 Account Takeover Bug Bounty ReportsIn this article, we will discuss the Account Takeover attack, and present 25 disclosed reports based on this issue.Sep 7, 2021Sep 7, 2021
Quick Guide to Web Penetration TestingThrough this article, we will discuss some tests and guidelines that are part of my Web Penetration Testing methodology.Jul 7, 2021Jul 7, 2021
Published inInfoSec Write-upsTop 25 Clickjacking Bug Bounty ReportsIn this article, we will discuss the Clickjacking vulnerability, how to find one, and present 25 disclosed reports based on this issue.Jun 15, 2021Jun 15, 2021
3 Traits of a Good Ethical HackerIn this article, we are going to discuss 3 important traits of any ethical hacker, bug bounty hunter, or penetration tester.May 11, 20211May 11, 20211