Exploit Security Blog
13 FOLLOWERS
Exploit Security offers security consultancy through a connected group of white-hat freelancers. Lean inside their blog and take a deep dive into the world of cyber security and penetration testing. Master the inner-workings of security software and learn how to strengthen your systems.
Exploit Security Blog
3M ago
We all know that technology progresses at warp speed, and Elon Musk’s latest creation, Optimus, represents a major breakthrough in the ..read more
Exploit Security Blog
3M ago
Authentication Bypass by Capture Replay Introduction Our Security Research Team at [exploitsecurity.io] discovered a vulnerability in the ..read more
Exploit Security Blog
3M ago
Unauthenticated Username Enumeration Introduction Our Security Research Team at [exploitsecurity.io] discovered a vulnerability in ..read more
Exploit Security Blog
3M ago
Authentication Bypass Introduction Our Security Researcher at [exploitsecurity.io] uncovered Multiple vulnerabilities found in the Magic ..read more
Exploit Security Blog
3M ago
Cross Site Request Forgery Introduction Our Security Researcher at [exploitsecurity.io] uncovered a CSRF vulnerability that allows an ..read more
Exploit Security Blog
9M ago
Our EXPLOIT THIS CTF is tailored to those hackers and enthusiasts alike, that share a passion for all things embedded, IoT or hardware related.
Squashed is an 100 point CTF challenge brought to you by Exploit Security. This and other CTF challenges can be found https://exploitthis.ctfd.io.
In our last blog we stepped through "Demystifying Debunked" challenge, now we will take a look at a two step challenge using a similar approach in this CTF Writeup. It is our belief that using a systematic methodology, this helps to build better technical capability when applying such knowledge to real-w ..read more
Exploit Security Blog
10M ago
Our EXPLOIT THIS CTF is tailored to those hackers and enthusiasts alike, that share a passion for all things embedded, IoT or hardware related.
Debunked is another 50 point CTF challenge brought to you by Exploit Security. This and other CTF challenges can be found https://exploitthis.ctfd.io.
In our last blog we stepped through "The Elves Magic" challenge, now we will take a look at another simple challenge using the same approach. It is our belief that using a systematic methodology, this helps to build better technical capability when applying such knowledge to real-world technical chal ..read more
Exploit Security Blog
10M ago
Our EXPLOIT THIS CTF is tailored to those hackers and enthusiasts alike, that share a passion for all things embedded, IoT or hardware related.
The Elves Magic is a 50 point CTF challenge brought to you by Exploit Security. This and other CTF challenges can be found https://exploitthis.ctfd.io.
This blog post will look to step through this simple challenge using a systematic methodology, which helps to build technical capability when applying such knowledge to real-world technical challenges.
Task: The participant is tasked with examining a given file, with the caption, "Flag is found when un ..read more