WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00Insecure CAPTCHA in DVWA5d ago · 27 min read · 1 Introduction In this post, the Insecure CAPTCHA vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to bypass the poor CAPTCHA systemJoin discussion
SPSaad Patelinsaad-patel.hashnode.dev00🐳 Docker – Day 6: Docker Networking5d ago · 15 min read · 1️⃣ Purpose of the Day (Why this matters in production) In production, containers rarely run alone. They talk to each other, expose APIs, connect to databases, and sit behind load balancers. If DockerJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00Weak Session IDs in DVWAApr 12 · 16 min read · 1 Introduction In this post, the Weak Session IDs vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to work out how the ID is generatJoin discussion
MAMohammad Alsarafinnatbox.hashnode.dev00Understanding NAT VPS: What It Is, When to Use It, and When Not ToApr 11 · 2 min read · If you've shopped for cheap VPS hosting, you've probably seen the term "NAT VPS" and maybe not been entirely sure what it means or whether it matters. This post explains it clearly. What is a NAT VPS?Join discussion
IHIsreal Hoganinsudohogan.hashnode.dev20Unikernels: Less Is MoreApr 10 · 6 min read · Imagine you had a big box of toys and whenever you wanted one of the toys (say Super Mario action figure), you’d have to take out all the toys in your toy box just to find the action figure. This is kJoin discussion
MBMatt Brownincloudsecburrito.com00Runtime Security in Kata: Less Visibility, Better SignalApr 2 · 11 min read · Kata containers give you a stronger boundary. That is the point. But that boundary also breaks a lot of the assumptions we rely on for runtime security. The usual model works because containers share Join discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00DOM-Based XSS in DVWA Mar 29 · 14 min read · Introduction This post examines a DOM-based cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) and demonstrates how it can be exploited to achieve client-side code Join discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00JavaScript Attacks in DVWAMar 26 · 21 min read · 1 Introduction In this post, the JavaScript Attacks vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to analyse and manipulate the JJoin discussion
MBMatt Brownincloudsecburrito.com00Kata Containers: When "Container Escape" Stops WorkingMar 25 · 10 min read · I wanted to try Kata Containers. Not in a "read the docs and feel informed" way, but in a burrito way. Which of course means: run it, break it, and see what actually changes. Because on paper, Kata soJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00Stored XSS in DVWAMar 25 · 12 min read · Introduction This post examines a Stored Cross-Site Scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA), and demonstrates how it can be used to achieve persistent client-side cJoin discussion