Posts
All the articles I've posted.
-
Serialization Attacks for Pentesters: Deserialization Vulnerabilities Explained
Master serialization and deserialization attacks. Learn how to identify and exploit insecure deserialization in Java, PHP, Python, .NET, and more.
-
How Proxies Work for Pentesters: Forward, Reverse & Interception
Master proxy fundamentals for penetration testing. Learn forward vs reverse proxies, transparent proxies, Burp Suite internals, and how to intercept HTTPS traffic.
-
Same-Origin Policy & CORS Deep Dive for Pentesters
Master browser security fundamentals. Learn Same-Origin Policy, CORS misconfigurations, and how to exploit cross-origin vulnerabilities in penetration testing.
-
ARP & Layer 2 Attacks for Pentesters: MITM, Spoofing & Network Attacks
Master Layer 2 network attacks for penetration testing. Learn ARP spoofing, MAC flooding, VLAN hopping, and MITM techniques with practical examples.