Paras Sahuwebed.hashnode.dev·Feb 28, 2024A Complete Guide to Access Tokens, Refresh Tokens, and Their Role in Enhancing Application SecurityAccess Tokens Access tokens are the token that confirms whether the specific user is authorized to perform a particular action in an application or not. Tokens are useful as they reduce the multiple login for authorization inconvenience of the user ....DiscussToken Security
PopLab AgencyforAD Attacksad-attacks.hashnode.dev·Jun 2, 2023Understanding the PetitPotam Vulnerability- Free GuideDive deep into the PetitPotam vulnerability, an NTLM relay attack targeting Windows servers. This article provides a detailed analysis of the vulnerability, and its impact on network security and Active Directory, and suggests effective strategies to...Discussauthentication