Hand holding a pirate toy

Bounty Writeup

How to resolve HTB Bounty

In this article, we present how to exploit a Bounty machine's vulnerabilities and how to gain...

Vulnerability disclosure

Vulnerability Disclosure Ecosystem

Responsible vulnerability disclosure

In this blog post, we will explain some good practices of vulnerability disclosure by...

Painting a red and blue wall

LibSSH New Vulnerability

New vulnerability on libssh CVE-2018-10933

Here, we will explain a vulnerability that allows a remote attacker to bypass authentication by...

Developers programming in an office

DevOops Writeup

How to resolve HTB DevOops

In this article, we present how to exploit the vulnerabilities of DevOops, a Linux Hack the Box...

Cup with message in front of screen with code

Functional Fashion in JavaScript

Functional programming in JavaScript

Here we talk about some first steps in functional JavaScript and recommendations for migration....

Snake checking a code

Are You Checking Types?

Static type checking with mypy

What are the potential problems of untyped objects in Python? Here we work on the importance of...

Swiss army knive

Road to Functional Python

Functional coding in Python

Here is an intro to the essential aspects of functional programming in Python, its benefits, how...

Piece of code with a function

Why We Go Functional?

Functional vs Imperative

In this blog post, we show an analysis of why it is necessary to go functional even with...

Unknown person below lights

The Treacherous POODLE

How does the SSL fallback's works

Here we discuss the exploitation of an SSL/TLS flaw that creates a fallback on TLS usage to SSL 3.0.

Release the beast

Release the BEAST!

Understanding the BEAST

How does a theorized attack become practical after more than 10 years? Find out here.

Computer showing a pirate flag

My Heart Bleeds (But Not for You)

Understanding the flaw behind Heartbleed

Here we talk about Heartbleed, the result of a buggy implementation of the TLS protocol on...

Person holding sticky note

Pars Orationis Non Est Secura

Using parser combinators to detect flaws

Learn here how to use Python and pyparsing to parse application code in order to find SQL...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy