Elon Musk’s Optimus Bot: A Double-Edged Revolutionary Leap
Exploit Security Blog
by Chris Glanden
3M ago
We all know that technology progresses at warp speed, and Elon Musk’s latest creation, Optimus, represents a major breakthrough in the ..read more
Visit website
CVE-2022-43704
Exploit Security Blog
by Victor Hanna
3M ago
cve-2022-43704 ..read more
Visit website
CVE-2022-29593
Exploit Security Blog
by Victor Hanna
3M ago
Authentication Bypass by Capture Replay Introduction Our Security Research Team at [exploitsecurity.io] discovered a vulnerability in the ..read more
Visit website
CVE-2021-45901
Exploit Security Blog
by Victor Hanna
3M ago
Unauthenticated Username Enumeration Introduction Our Security Research Team at [exploitsecurity.io] discovered a vulnerability in ..read more
Visit website
CVE-2020-27199
Exploit Security Blog
by Victor Hanna
3M ago
Authentication Bypass Introduction Our Security Researcher at [exploitsecurity.io] uncovered Multiple vulnerabilities found in the Magic ..read more
Visit website
CVE-2019-12836
Exploit Security Blog
by Victor Hanna
3M ago
Cross Site Request Forgery Introduction Our Security Researcher at [exploitsecurity.io] uncovered a CSRF vulnerability that allows an ..read more
Visit website
Living Off The Land Binaries
Exploit Security Blog
by Victor Hanna
3M ago
Living Off The Land Binaries ..read more
Visit website
Inflating Squashed: Exploit This CTF Writeup
Exploit Security Blog
by Exploit Security
9M ago
Our EXPLOIT THIS CTF is tailored to those hackers and enthusiasts alike, that share a passion for all things embedded, IoT or hardware related. Squashed is an 100 point CTF challenge brought to you by Exploit Security. This and other CTF challenges can be found https://exploitthis.ctfd.io. In our last blog we stepped through "Demystifying Debunked" challenge, now we will take a look at a two step challenge using a similar approach in this CTF Writeup. It is our belief that using a systematic methodology, this helps to build better technical capability when applying such knowledge to real-w ..read more
Visit website
Demystifying Debunked: Exploit This CTF Writeup
Exploit Security Blog
by Exploit Security
10M ago
Our EXPLOIT THIS CTF is tailored to those hackers and enthusiasts alike, that share a passion for all things embedded, IoT or hardware related. Debunked is another 50 point CTF challenge brought to you by Exploit Security. This and other CTF challenges can be found https://exploitthis.ctfd.io. In our last blog we stepped through "The Elves Magic" challenge, now we will take a look at another simple challenge using the same approach. It is our belief that using a systematic methodology, this helps to build better technical capability when applying such knowledge to real-world technical chal ..read more
Visit website
Unlocking The Elves Magic: Exploit This CTF Writeup
Exploit Security Blog
by Exploit Security
10M ago
Our EXPLOIT THIS CTF is tailored to those hackers and enthusiasts alike, that share a passion for all things embedded, IoT or hardware related. The Elves Magic is a 50 point CTF challenge brought to you by Exploit Security. This and other CTF challenges can be found https://exploitthis.ctfd.io. This blog post will look to step through this simple challenge using a systematic methodology, which helps to build technical capability when applying such knowledge to real-world technical challenges. Task: The participant is tasked with examining a given file, with the caption, "Flag is found when un ..read more
Visit website

Follow Exploit Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR