|
You are here |
miparnisariblog.wordpress.com | ||
| | | | |
kersed.net
|
|
| | | | | [AI summary] This article explains Cross-Site Scripting (XSS) attacks, categorizing them into client-side vs server-side and reflected vs stored types, and provides defense strategies such as input validation, output encoding, and secure session management. | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
victoria.dev
|
|
| | | | | [AI summary] The article discusses SQL injection and cross-site scripting (XSS) vulnerabilities, emphasizing the importance of securing user input to prevent security breaches by white hat hackers. | |
| | | | |
www.tremolosecurity.com
|
|
| | | [AI summary] A blog post discussing a talk on Kubernetes identity management from Google DevFestDC, including a screen cast, slides, and code availability on GitHub. | ||