Photo by Cookie the Pom on Unsplash

My Favorite Password: '123456'

You could be a victim of Credential Stuffing


I wrote this post to give you an overview of the Credential Stuffing attack and some short...



Photo by Mick Haupt on Unsplash

Search the History

Searching for credentials in a repository


As everyone knows in our context, production credentials should be protected. In this post, we...



Red wooden mailbox near green leaf plan. Photo by Bundo Kim on Unsplash.

Respond the Name

Attacking a network using Responder


Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do...



Toasting Marshmallow. Photo by hcmorr on Unsplash: https://unsplash.com/photos/qlHRuDvaxL8

Roasting Kerberos

Attacking a DC using kerberoast


Windows Active Directory works using the Kerberos protocol, and in this blog post, we detail how...



Rusty lock

Requiem for a p455w0rD

Why passphrases are better than passwords


In this blog post, we mainly make a comparison between having weak or complicated passwords...



Multiple icon accounts

Multiple Credentials Begone!

Security issues and solutions of SSO services


Here we explain how to use SAML, a popular SSO implementation standard for logging users into...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy