Author:
Felipe Ruiz
Category:
techniques
Tags:
credential,
password,
web,
application,
cybersecurity,
business
I wrote this post to give you an overview of the Credential Stuffing attack and some short...
In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD
In this article we will defeat some protections using several techniques for exploting HackSys...
This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...
This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers
Author:
Felipe Ruiz
Category:
interview
Tags:
interview,
red team,
osce,
training,
exploit,
software
We spoke with Andres Roldan, our Offensive Team Leader, who recently obtained his OSCE...
This post will show how to create a complete, functional exploit creating a complex shellcode using ROP
This post will show how bypass the Data Execution Prevention security mechanism using...
This post will show how the Data Execution Prevention (DEP) security mechanism works and what...
This post will describe the journey that I took to earn the OSCE certification.
Author:
Felipe Ruiz
Category:
politics
Tags:
policies,
cybersecurity,
social,
information,
mistake,
business
This blog post might give you a better understanding of what has been achieved by Max Schrems...
Author:
Felipe Ruiz
Category:
opinions
Tags:
cybersecurity,
red team,
hacking,
pentesting,
ethical hacking,
blue team
This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.