Photo by Daniel McCullough on Unsplash

Interview With Safety Detectives

Mauricio Gomez talking about Fluid Attacks


Mauricio Gomez, a co-founder of Fluid Attacks, recently had an interview with Aviva Zacks of...



Photo by Keagan Henman on Unsplash

Exploiting MiTeC NetScanner

Tricky SEH exploit


This post will show how to build our version of an exploit for NetScanner 4.0.0.0, which was...



Photo by Pierre Binet on Unsplash

Vulnserver Reverse Engineering

The devil is in the details


This post will show how use reverse engineering techniques and tools to find vulnerabilities on...



Photo by Tomas Sobek on Unsplash

Exploiting QuickZip 4.x

Exploit-Fu


This post will show how to build our version of an exploit for QuickZip 4.x SEH overwrite.



Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Kuma Kum on Unsplash

Manual SQLi Bypass

Bypassing SQLi filters manually


SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...



Blacksmith. Photo by Hannah Gibbs on Unsplash: https://unsplash.com/photos/BINLgyrG_fI

Understanding SSRF

Attacking a web server using SSRF


Here we will see what a Server Side Request Forgery is, how hackers can exploit it, and what are...



Photo by Mick Haupt on Unsplash

Search the History

Searching for credentials in a repository


As everyone knows in our context, production credentials should be protected. In this post, we...



Photo by Jeremy Thomas on Unsplash

Effective Vulnerability Triage

BDSA and various data points for prioritization


This post is based on the webinar 'Effective Vulnerability Remediation Requires More than One...



Photo by Tyler Nix on Unsplash

Have You Noticed the PII Leakage?

WhiteHat: the more you collect, the higher the risk


This blog post is based on the webinar 'Mobile Security App-titude: Best Practices for Secure...



Photo by David Kovalenko on Unsplash

Continuous Search for the Unknown

ForAllSecure on the Next-Generation fuzzing


This post is based on the information given on February 11th by Brumley (ForAllSecure) in his...



Red wooden mailbox near green leaf plan. Photo by Bundo Kim on Unsplash.

Respond the Name

Attacking a network using Responder


Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy