Fluid Attacks logo
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
handshake

A Conflict of Interest?

You probably don’t see it.

Years ago, we faced something odd in a project: a customer was putting pressure on us while performing a One-Shot Hacking. The manager who hired us demanded preliminary results and made comments...



Computer with four padlocks, one unlocked

Dude, where’s my XSS protection?

Solving Halls of Valhalla Challenge: XSS4

Web application security is a major concern nowadays. You have to make sure your application is secure, especially if you have a lot of users. There are many controls a developer can implement to...



Yellow puzzle missing one piece, shown in red

Reversing for mortals

Solving Yoire crackme average challenge

It’s hard to really know where to start when you’re new to hacking. When I first started to get into the hacking world I came across something called Reverse Engineering, the art of...



Free wifi sign

Stupid neighbours using WEP

Solving Yashira WEP Security challenge

Wi-Fi security has not always been the best. The first attempt at securing Wi-Fi access points was termed Wired Equivalent Privacy (WEP). WEP is a security algorithm that was implemented on IEEE...



Pyramids in the desert

Types of triangles

Solving CodeAbbey Pythagorean Theorem challenge

A triangle is a 3-sided polygon sometimes (but not very commonly) called the trigon. Every triangle has three sides and three angles, some of which may be the same. The sides of a triangle are...



Magnifying glass finding password in a set of binary data

Storing passwords safely

Solving Yashira hash challenge 3

By the end of the year, we witnessed a huge increase in the amount of attacks that extracted large quantities of personal information, emails and passwords. Even one of the biggest email services,...



Service status - Terms of Use