Reza RashidiforRedTeamReciperedteamrecipe.com·Jul 25, 2024RedTeam Story #1: XSS, LFI, LogrotateMITRE ATT&CK Techniques and Tactics Tactic: Reconnaissance Technique ID: T1595 Attack Context Reconnaissance is the phase where the attacker gathers information about the target system. This phase is critical for understanding the system's struct...Discuss·720 readsredteamstory
Cxnsxlecxnsxle.hashnode.dev·Jul 26, 2023Log Poisoning VulnerabilityWhat is Log Poisoning? Log poisoning is a cybersecurity attack technique aimed at manipulating or polluting the data collected in log files within a computer system or network. Log files are used to record various activities and events on a system, s...Discuss·1 like·51 readsowasp
Cxnsxlecxnsxle.hashnode.dev·Jul 19, 2023LFI VulnerabilityWhat is LFI? Local File Inclusion (LFI) is an attack technique in which we as attackers trick a web application into either running or exposing files on a web server. LFI attacks can expose sensitive information, and in severe cases, they can lead to...Discuss·35 readshacking