8 results found for keyword
8 results found for keyword:
Fox 13 – How to avoid getting scammed when planning holiday travel
Traveling this summer? Be wary of online travel deals that seem too good to be true. Advisory Solutions Director Alex Hamerstone spoke to Fox 13 in Salt Lake City about how to avoid scams and protect your personal information.
NBC 10 WJAR – Watch out for travel scams this Memorial Day weekend
Intrinsicly communicate unique schemas without best-of-breed e-commerce. Quickly maximize stand-alone relationships without flexible materials. Professionally harness cooperative.
Failure to Restrict URL Access: It’s Still a Thing
Discover feature flags and modify responses using Burp Suite's Match and Replace rules or Reshaper plugin to enhance your web application testing capabilities.
Most Reported Web Findings of 2023
I reviewed the findings from the application and API assessments that the TrustedSec Software Security Team conducted during 2023 to see what issues we were seeing most often. I put them into categories that I thought would help identify trends…
Introducing Meta-Detector
In this blog post, I’m going to discuss a new Open-Source Intelligence (OSINT) tool I created to assist with collecting information about target organizations during penetration testing engagements. I call it, Meta-Detector.Lately, I've noticed that…
How to Get the Most Out of a Pentest
TL;DRDefine the goal of an assessment.Take time to choose the right assessment type.The more detail you give about an asset, the better quality your report will be.Select the right environment for the assessment.Consider the timing for performing…
Kubernetes for Pentesters: Part 1
In the first section of this multi-part practical guide, I’ll introduce you to Kubernetes (K8s) from a penetration testing perspective, including basic information, vocabulary, and how to identify and explore Kubernetes instances. Stay tuned for the…
There's More than One Way to Trigger a Windows Service
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services like Remote Registry and EFS. Learn how they can be activated with little to no code required.