Photo by Kuma Kum on Unsplash

Manual SQLi Bypass

Bypassing SQLi filters manually


SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...



Blacksmith. Photo by Hannah Gibbs on Unsplash: https://unsplash.com/photos/BINLgyrG_fI

Understanding SSRF

Attacking a web server using SSRF


Here we will see what a Server Side Request Forgery is, how hackers can exploit it, and what are...



Photo by Mick Haupt on Unsplash

Search the History

Searching for credentials in a repository


As everyone knows in our context, production credentials should be protected. In this post, we...



Red wooden mailbox near green leaf plan. Photo by Bundo Kim on Unsplash.

Respond the Name

Attacking a network using Responder


Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



Toasting Marshmallow. Photo by hcmorr on Unsplash: https://unsplash.com/photos/qlHRuDvaxL8

Roasting Kerberos

Attacking a DC using kerberoast


Windows Active Directory works using the Kerberos protocol, and in this blog post, we detail how...



Lock on a fence

Secure Cloud as Code

The weakest link in security is not the technology.


Here we want to help you secure your deployments and avoid common mistakes. Infrastructure as...



Executive leaking business information

Attacking Without Announce

Nobody knows, but everything is allowed


We want to guide you about some management policies we suggest that you could take to answer...



Hand holding a pirate toy

Bounty Writeup

How to resolve HTB Bounty


In this article, we present how to exploit a Bounty machine's vulnerabilities and how to gain...



Vulnerability disclosure

Vulnerability Disclosure Ecosystem

Responsible vulnerability disclosure


In this blog post, we will explain some good practices of vulnerability disclosure by...



Painting a red and blue wall

LibSSH New Vulnerability

New vulnerability on libssh CVE-2018-10933


Here, we will explain a vulnerability that allows a remote attacker to bypass authentication by...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy