hacking
-
Privilege escalation on Windows through a card printer software CVE-2024-34329 Back in May, I was playing around with a card printer software I had previously installed on my laptop for a security workshop my company had organized to demonstrate how easy it is to clone another company’s employee badge. On Windows, it is possible to…
-
This tutorial requires knowledge using your computer’s command line interface (shell) and Burp Suite. There are various ways to pentest an mobile application. Usually, mobile applications will run on iOS or Android. Unless you have a jailbroken iPhone or a Correlium instance, you will most likely be debugging the app on Android. Now yes, you…
-
Depending on the technologies used on your web application, you could be vulnerable to multiple different types of injections. We will discuss 4 popular injection attacks and how to mitigate them. Most of the information from this blog comes directly from OWASP and PortSwigger. Small confession… I wrote this blogpost mostly for myself, to study…
-
Using Google Dorking on a man Google dorking (or Google hacking) is an advanced hacker technique that uses the Google search bar to find information that is not always available through standard search queries. Some common keywords would be : Try typing in the Google search bar ‘intitle:”hacked sports studio”‘ (you will find my web…
-
How I hacked my luxury local sports studio (and two others) One day I decided to take a look at the application that my sports club uses. They use a software for studio management, covering everything from bookings and payroll to marketing and more. I began looking at the application because my sports club website was…
