Text editor with code highlighting

Another Proud Son of JSON

Using JSON Web Token to send data


Here we introduce JSON Web Token, a simple, quick way to send secure, digital signed data from...



Person using a magnifying glass in keyboard

Symbolic Execution for Mortals

What it is and how it works


In this article, we intend to explain an approach to symbolic execution, which is very useful...



Chess piece different from the others

Conserving Your Identity

Using WS-Security to secure your web apps


In this article, we present a secure way to exchange information between different web services...



Multiple icon accounts

Multiple Credentials Begone!

Security issues and solutions of SSO services


Here we explain how to use SAML, a popular SSO implementation standard for logging users into...



several balloons floating in the air

Healthcare in the Clouds

Cloud based systems in healthcare and their issues


Cloud-based systems can be of great benefit to healthcare institutions, but they can also lead...



Computer with four padlocks, one unlocked

Dude, Where's My XSS Protection?

Solving Halls of Valhalla Challenge: XSS4


Web security nowadays is a matter of concern. In this article, we explain how to avoid one of...



Wrong red piece in white puzzle

Reversing for Mortals

Solving Yoire crackme average challenge


In this article, we provide a first approach to reverse engineering by solving a simple but...



Free wifi sign

Stupid Neighbors Using WEP

Solving Yashira WEP Security challenge


In this article, we explain how to crack a Wired Equivalent Privacy (WEP) algorithm by analyzing...



Code with hashed data on the side

Storing Passwords Safely

Solving Yashira hash challenge 3


Hash algorithms can be cracked using huge databases with hashed common words. It's essential to...



< 1 2 3 4 5 6 7 8 9 10 11 12

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy