Photo by visuals on Unsplash

Online Voting for a New President?

The trouble with OmniBallot and other voting platforms


In this post, we show you the exposed vulnerabilities of one of the many online voting options...



Photo by Ingo Stiller on Unsplash

Discovering Security Champions

Six recommendations for SecDevOps from Carnegie Mellon


Here you'll learn about Security champions. But first, we give you five recommendations if...



Photo by Kuma Kum on Unsplash

Manual SQLi Bypass

Bypassing SQLi filters manually


SQL injection can be one of the most dangerous vulnerabilities. Here we will see how to bypass...



Photo by Sebastian Pena Lambarri on Unsplash

Everyone Is Responsible for SEC

An overview of DevSecOps, better SecDevOps


Through this blog post, you will know what DevSecOps is, how it applies, and why it is...



Blacksmith. Photo by Hannah Gibbs on Unsplash: https://unsplash.com/photos/BINLgyrG_fI

Understanding SSRF

Attacking a web server using SSRF


Here we will see what a Server Side Request Forgery is, how hackers can exploit it, and what are...



Photo by Michael Fenton on Unsplash

Breaking Down DevOps

The central components of DevOps definition


Here we introduce DevOps, a working methodology whose principles are communication,...



Photo by Glen Hooper on Unsplash

Trust Nothing, Verify Everything

Sharing at least a modicum about phishing attacks


In this post, we give some general ideas about phishing, hoping to contribute to its prevention.



New York City Skyline

Querier Writeup

How to solve HTB Querier


Here we explain how to use Querier's insecure configurations to gain system access, and how to...



Fluid Attacks, Among the Top Global Leaders 2018

Among the Top Global Leaders 2018

Fluid Attacks, a top cybersecurity company


Fluid Attacks was recognized as a global leader in the Cybersecurity category by Clutch, as one...



Hand holding a pirate toy

Bounty Writeup

How to resolve HTB Bounty


In this article, we present how to exploit a Bounty machine's vulnerabilities and how to gain...



Developers programming in an office

DevOops Writeup

How to resolve HTB DevOops


In this article, we present how to exploit the vulnerabilities of DevOops, a Linux Hack the Box...



Blank CSV document icon

Is that CSV Secure?

Defining CSV injection vulnerabilities


Comma-Separated Values file is a common extension in data files used in several application...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy