Web Penetration Testing - Vulnerability
![Achieving Cybersecurity Maturity with NIST Framework in Critical Infrastructure Organizations](https://images.ctfassets.net/1kaqtc248p95/1fMnw9Hdta2jk2BuG7aO9S/ba63f93f3575ed9e5e16b9900b5c2b88/NIST-Hero.webp)
Achieving Cybersecurity Maturity with NIST Framework in Critical Infrastructure Organizations
August 2, 2023
![Exploiting Insecure Deserialization in Web Applications](https://images.ctfassets.net/1kaqtc248p95/6AtuwtTc3xAZzSZGk1VYaY/530ce3e17c9745f6175cfa84509da295/Deserialization_-How-it-Works-1200x630-1.png)
Exploiting Insecure Deserialization in Web Applications
July 20, 2023
![Zero-Day Vulnerabilities: Web Application Exploitation](https://images.ctfassets.net/1kaqtc248p95/6bKRc8YeHcTyM5tvZhfBVQ/1c81373587212a729168fca6b4b5d978/zero-day-exploit-1.jpg)
Zero-Day Vulnerabilities: Web Application Exploitation
June 21, 2023
![Server-Side Template Injection (SSTI): Exploitation Techniques](https://images.ctfassets.net/1kaqtc248p95/3hS7Spbz1XFqW1uYe3FGrt/b6ef567106f6aabcaac37e32c182dc82/0_gcu4cXwN3c1VhGbs.png)
Server-Side Template Injection (SSTI): Exploitation Techniques
July 15, 2023
![Anatomy of a Web Penetration Test: Step-by-Step Process](https://images.ctfassets.net/1kaqtc248p95/3FmB9slz4CIc7JUgzHa7w0/e01f864734f059d37a7da0ec334e3011/Penetration-Test-scaled.webp)
Anatomy of a Web Penetration Test: Step-by-Step Process
July 14, 2023
![Vulnerability Assessment vs. Penetration Testing: What's the Difference?](https://images.ctfassets.net/1kaqtc248p95/QptTqOG3ncInbPp1ME9f4/684f1df68df6ab0454aab6843a8136d0/penetration_testing_vs_vulnerability_assessment-01_1.png)
Vulnerability Assessment vs. Penetration Testing: What's the Difference?
July 13, 2023
![Web Application Security Scanning Tools: A Comparative Analysis](https://images.ctfassets.net/1kaqtc248p95/Uk9rT3fMxMHKrFLwzMtea/e11fed1a13dbae16cddf7e10a082daa0/1570190198VxSgRtAkwC.jpg)
Web Application Security Scanning Tools: A Comparative Analysis
July 12, 2023
![Remote File Inclusion (RFI) and Local File Inclusion (LFI) Attacks](https://images.ctfassets.net/1kaqtc248p95/4T8gAAvn7kJbaAu6TQ8Trx/e0f269ae9cb2a69346b3ec1e64b38efd/Local-File-Inclusion-LFI.png)
Remote File Inclusion (RFI) and Local File Inclusion (LFI) Attacks
July 11, 2023
![Exploiting File Upload Vulnerabilities in Web Applications](https://images.ctfassets.net/1kaqtc248p95/5YNXNax24pbQLiSaozWwAF/94a4fcf6b25b7811370a02bd40112b47/logo.png)
Exploiting File Upload Vulnerabilities in Web Applications
July 10, 2023
![What is security misconfiguration in OWASP?](https://images.ctfassets.net/1kaqtc248p95/49KFEgKsdSZVVkPZzRv8nf/8f8e97a16b52092852bbcff442eae338/Security-Misconfiguration-1250.png)
What is security misconfiguration in OWASP?
July 7, 2023
![Directory Traversal Attack Case Study](https://images.ctfassets.net/1kaqtc248p95/2y71sG7CzIWqfBYSwg2Upt/57fc4018297f5fc2effba5246fbc5da9/Directory-Traversal-Attack-1200x630-1.png)
Directory Traversal Attack Case Study
July 7, 2023
![What is a cross-site scripting (XSS) attack? What is the purpose of attackers?](https://images.ctfassets.net/1kaqtc248p95/1L8qkQI7DxqX978elOzbtB/1c0ec64365ddbee058958de8305dfeca/XSS-attacks-what-is-cross-site-scripting.webp)
What is a cross-site scripting (XSS) attack? What is the purpose of attackers?
July 5, 2023
![Protecting Your Wireless Network Against Cyber Attacks](https://images.ctfassets.net/1kaqtc248p95/5IJw4ys7mDuWTse8ktB1sy/f7be5473c7785df98faa9d422da19fa0/cyber.jpg)
Protecting Your Wireless Network Against Cyber Attacks
May 12, 2023
![Assessing the Security of Cloud Environments](https://images.ctfassets.net/1kaqtc248p95/3lNCp79Xm4ByDluB9FdUnW/3b0baf59f44194ea2ad3bfb1ebdb90e0/assess.png)
Assessing the Security of Cloud Environments
May 13, 2023
![Twitter Data Breach](https://images.ctfassets.net/1kaqtc248p95/5xtQvzdvOqKgMhBPEsgz8h/6cac66f5fc2dbf29d8d0d189120e6000/twitter.png)
Twitter Data Breach
May 24, 2023
![Suzuki Data Breach Forces Plant Shutdown](https://images.ctfassets.net/1kaqtc248p95/1B04HT0VzgHdg6AZQYHJM4/e2454f0fe84f7cf94688c71559ad97d1/suzuki-data-breach.jpg)
Suzuki Data Breach Forces Plant Shutdown
May 25, 2023
![Shein Data Breach: What You Need to Know](https://images.ctfassets.net/1kaqtc248p95/2abru9VYw6ki8IEqF6FpKd/e64d1493598cc9668c0f683d1e853e31/shein.png)
Shein Data Breach: What You Need to Know
May 31, 2023
![Network Penetration Testing For Weaknesses](https://images.ctfassets.net/1kaqtc248p95/7aK4oplkEBS9Pp31pzHVgi/e76b3f7a45e648cbdab6a30865ae130a/net_pen.png)
Network Penetration Testing For Weaknesses
May 11, 2023
![Automating Metasploit with Pymetasploit3 in Continuous Integration](https://images.ctfassets.net/1kaqtc248p95/6TyGSXxnBgYj5l7DmPSPqw/c8dc9e50a3eb53684a17adb73af33c40/kk.png)
Automating Metasploit with Pymetasploit3 in Continuous Integration
May 8, 2023
![Threat Modelling For Web Penetration Testing: Assessing Risks And Impact](https://images.ctfassets.net/1kaqtc248p95/5o4XLsLXGB1VWYgOQhHVWQ/eb69c4c0b1d1e39ecd10ad4e49c4cf71/safeguard.png)
Threat Modelling For Web Penetration Testing: Assessing Risks And Impact
June 1, 2023
![How Can We Automate Penetration Testing In Order To Improve Network Security](https://images.ctfassets.net/1kaqtc248p95/3xg6D4DVsme0yOFYRy9DoY/603c1e1053ca2c002d66cf2b21cbe8ea/ns.png)
How Can We Automate Penetration Testing In Order To Improve Network Security
June 2, 2023
![What Priority Is Looking For Security Vulnerabilities In The Packages And Libraries?](https://images.ctfassets.net/1kaqtc248p95/hCjPLNM73o7mishyo2kNa/978568c7570b2a91aa815a49e4f5f95a/quest_for_vulnerability.png)
What Priority Is Looking For Security Vulnerabilities In The Packages And Libraries?
June 3, 2023
![CVE-2022-34265 Exploit Step-by-Step](https://images.ctfassets.net/1kaqtc248p95/4kOVYdrE0RI1Y6tRdFfmjt/6eac7d917ba3013042efe7f396639dab/exploit.jpg)
CVE-2022-34265 Exploit Step-by-Step
June 9, 2023
North Korean Hackers Breach Hospital in Seoul, Threatening Data Security
June 13, 2023