Photo by Kuma Kum on Unsplash

Manual SQLi Bypass

Bypassing SQLi filters manually


SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...



Blacksmith. Photo by Hannah Gibbs on Unsplash: https://unsplash.com/photos/BINLgyrG_fI

Understanding SSRF

Attacking a web server using SSRF


Here we will see what a Server Side Request Forgery is, how hackers can exploit it, and what are...



Photo by Bradley Feller on Unsplash

We've Reached a New Standard

More requirements in Rules are firmly supported


Here we briefly outline Rules, Fluid Attacks's set of security requirements, along with the...



Photo by Geran de Klerk on Unsplash

Are SAST and SCA Enough for You?

An automatic process that could prove to be limited


This blog post is based on the webinar 'Audit your App with Kiuwan Local Analyzer' by Sebastian...



Man sitting facing laptop. Photo by Clint Patterson on Unsplash: https://unsplash.com/photos/dYEuFB8KQJk

How to Pass the OSCP

The meaning of Try Harder


The OSCP exam is one of the hardest certifications out there for pentesters. Here we show you...



handshake

A Conflict of Interest?

You probably don’t see it.


In cybersecurity, there's plenty of opportunities for Conflicts of Interest to emerge. Here we...



Choices. Photo by Nathan Dumlao on Unsplash: https://unsplash.com/photos/pMW4jzELQCw

Risk Indicator Roundup

A matter of taste


Here we compare risk indicators used in quantitative finance, giving their pros and cons. Most...



New information. Photo by M. Parzuchowski on Unsplash: https://unsplash.com/photos/GikVY_KS9vQ

Updating your beliefs

How Bayes Rule affects risk


Here you can find how to use Bayes rule and basic probability theory to reduce uncertainty,...



Numbers notes on Unsplash: https://unsplash.com/photos/aG-pvyMsbis

Monetizing Vulnerabilities

From probabilites to dollars and cents


Here we work using calibrated estimates to run a Monte Carlo simulation to obtain the expected...



Risky poker move. Credits: https://unsplash.com/photos/vBpd607jLXs

Quantifying Risk

From color scales to probabilities and ranges


Here we discuss a survey of probabilistic methods that can be applied to quantify cybersecurity...



Person working on the computer while looking at cellphone

Delimiting an Ethical Hacking

How to define the scope of your objectives


When security flaws are found through ethical hacking, it is important to delimit the...



Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy