Photo by Jonathan Petersson on Unsplash

Tribe of Hackers Red Team 5.0

Learning from the red team expert Carlos Perez


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Chase Moyer on Unsplash

Tribe of Hackers Red Team 4.0

Learning from the red team expert 'Tinker Secor'


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Dorinel Panaite on Unsplash

Tribe of Hackers Red Team 3.0

Learning from the red team expert Georgia Weidman


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Manyu Varma on Unsplash

Tribe of Hackers Red Team 2.0

Learning from the red team expert Benjamin Donnelly


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share...



Photo by Lucas Benjamin on Unsplash

Tribe of Hackers Red Team 1.0

Learning from the Red Team Expert Marcus J. Carey


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...



Photo by Johannes Plenio on Unsplash

Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment


This post is based on the information given on February 7th by Sylvester, from Lumu, in his...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



Turned on Android smartphone. Photo by Pathum Danthanarayana on Unsplash: https://unsplash.com/photos/t8TOMKe6xZU

Intercepting Android

Intercept applications in newer Android phones


Android is one of the most suitable targets for hackers. Here we show how to intercept Android...



handshake

A Conflict of Interest?

You probably don’t see it.


In cybersecurity, there's plenty of opportunities for Conflicts of Interest to emerge. Here we...



Vulnerability disclosure

Vulnerability Disclosure Ecosystem

Responsible vulnerability disclosure


In this blog post, we will explain some good practices of vulnerability disclosure by...



Painting a red and blue wall

LibSSH New Vulnerability

New vulnerability on libssh CVE-2018-10933


Here, we will explain a vulnerability that allows a remote attacker to bypass authentication by...



Person working on the computer while looking at cellphone

Delimiting an Ethical Hacking

How to define the scope of your objectives


When security flaws are found through ethical hacking, it is important to delimit the...



Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.