Here, we will explain a vulnerability that allows a remote attacker to bypass authentication by...
In this article, we present how to exploit the vulnerabilities of DevOops, a Linux Hack the Box...
Here we talk about some first steps in functional JavaScript and recommendations for migration....
What are the potential problems of untyped objects in Python? Here we work on the importance of...
Here is an intro to the essential aspects of functional programming in Python, its benefits, how...
In this blog post, we show an analysis of why it is necessary to go functional even with...
Here we discuss the exploitation of an SSL/TLS flaw that creates a fallback on TLS usage to SSL 3.0.
How does a theorized attack become practical after more than 10 years? Find out here.
Here we talk about Heartbleed, the result of a buggy implementation of the TLS protocol on...
Learn here how to use Python and pyparsing to parse application code in order to find SQL...
In this post, we work on how to use Gherkin to document attack vectors in vulnerable...
In this blog post, we mainly make a comparison between having weak or complicated passwords...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.