DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Comments
4 min read
How I obtained my CISSP

How I obtained my CISSP

2
Comments
4 min read
A Brief Introduction to SAML Security Vector

A Brief Introduction to SAML Security Vector

8
Comments
29 min read
A Beginner’s Guide to Understanding & Recognizing Different Cyber Threats

A Beginner’s Guide to Understanding & Recognizing Different Cyber Threats

4
Comments
5 min read
Android Security : A Checklist For Exploiting WebView

Android Security : A Checklist For Exploiting WebView

2
Comments
11 min read
Spring Actuator - Finding Actuators using Static Code Analysis - Part 2

Spring Actuator - Finding Actuators using Static Code Analysis - Part 2

1
Comments
10 min read
🪄 Grype jq tricks : csv for spreadsheets 📊

🪄 Grype jq tricks : csv for spreadsheets 📊

5
Comments 4
1 min read
Logging in, a thing we all hate

Logging in, a thing we all hate

25
Comments 3
11 min read
Web Pentesting Learning - Beginner edition

Web Pentesting Learning - Beginner edition

10
Comments
3 min read
On the hook of a phisher

On the hook of a phisher

1
Comments
9 min read
Simple CTF - TryHackMe Walk Through

Simple CTF - TryHackMe Walk Through

17
Comments
5 min read
🎟️ Docker image security scan automation with GH issues

🎟️ Docker image security scan automation with GH issues

7
Comments 8
3 min read
HackTheBox Pandora Walkthrough

HackTheBox Pandora Walkthrough

5
Comments
17 min read
Setting up reconftw

Setting up reconftw

19
Comments
9 min read
Network Traffic Observability: Three PacketStreamer Use Cases

Network Traffic Observability: Three PacketStreamer Use Cases

5
Comments
3 min read
🗞️ Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?

🗞️ Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?

3
Comments 1
1 min read
Ohjelmistokehittäjästä eettiseksi hakkeriksi

Ohjelmistokehittäjästä eettiseksi hakkeriksi

3
Comments
2 min read
⚖️ Bench (and choose) Java-8 docker images with anchore/grype

⚖️ Bench (and choose) Java-8 docker images with anchore/grype

7
Comments 3
4 min read
Simulating a Phishing Attack Against Your Company

Simulating a Phishing Attack Against Your Company

5
Comments
3 min read
Where all DEVs fail in Security

Where all DEVs fail in Security

6
Comments
2 min read
From Software Developer to Ethical Hacker

From Software Developer to Ethical Hacker

19
Comments 1
3 min read
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

7
Comments
5 min read
Reconmap 1.1.0 release notes

Reconmap 1.1.0 release notes

5
Comments
2 min read
I did a few things at STM CTF 2018 Prelims

I did a few things at STM CTF 2018 Prelims

6
Comments
6 min read
Horrifying Vulnerabilities in the Death/Birth Certificate System

Horrifying Vulnerabilities in the Death/Birth Certificate System

4
Comments
2 min read
A Checklist to Quickly Evaluate SaaS Security

A Checklist to Quickly Evaluate SaaS Security

3
Comments
4 min read
How to Fix Clickjacking on NGINX Server in 6 Simple Steps🔥

How to Fix Clickjacking on NGINX Server in 6 Simple Steps🔥

14
Comments 2
2 min read
How to list Azure VM potentially affected by the OMI RCE

How to list Azure VM potentially affected by the OMI RCE

4
Comments 1
1 min read
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

6
Comments
4 min read
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas

AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas

8
Comments
3 min read
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021

AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021

7
Comments
3 min read
TryHackMe Super-Spam Walkthrough

TryHackMe Super-Spam Walkthrough

6
Comments
14 min read
TryHackMe Bounty Hacker Room Walkthrough

TryHackMe Bounty Hacker Room Walkthrough

3
Comments
4 min read
TryHackMe CMSpit Room Walkthrough

TryHackMe CMSpit Room Walkthrough

7
Comments
8 min read
A practical guide to writing secure Dockerfiles

A practical guide to writing secure Dockerfiles

8
Comments
12 min read
Auditing NodeJs modules with YARA rules

Auditing NodeJs modules with YARA rules

7
Comments
4 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

10
Comments
6 min read
When should my startup prioritize infosec?

When should my startup prioritize infosec?

2
Comments
3 min read
Threat modelling for hunted coders

Threat modelling for hunted coders

5
Comments
13 min read
How to get your boss to approve the training you want

How to get your boss to approve the training you want

4
Comments
4 min read
Illustrated Notes on Web Security Essentials

Illustrated Notes on Web Security Essentials

20
Comments 1
2 min read
Security Benchmarking at 1300 °C

Security Benchmarking at 1300 °C

5
Comments
5 min read
Pentesting Android Apps Using "Frida and Objection"

Pentesting Android Apps Using "Frida and Objection"

3
Comments 1
1 min read
Generating pentest reports with Reconmap

Generating pentest reports with Reconmap

6
Comments
3 min read
Information Gathering with "theHarvester"

Information Gathering with "theHarvester"

9
Comments
9 min read
Day-11: Read Info-sec Write-Ups!

Day-11: Read Info-sec Write-Ups!

6
Comments 1
1 min read
Newbies and Documentation

Newbies and Documentation

5
Comments
2 min read
Introducing Kubernetes Goat

Introducing Kubernetes Goat

17
Comments
3 min read
Dockerfile Security Checks using OPA Rego Policies with Conftest

Dockerfile Security Checks using OPA Rego Policies with Conftest

4
Comments
3 min read
Day-8: Started with Pentesterlab!

Day-8: Started with Pentesterlab!

4
Comments
1 min read
Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Day-7: Nmap -- Hacker's Favourite Scanning Tool!

11
Comments 2
2 min read
Day-5: A day off but...

Day-5: A day off but...

3
Comments
1 min read
Day-3: Bypassing the SOP!đź’Ł

Day-3: Bypassing the SOP!đź’Ł

8
Comments
2 min read
Day-2: Understanding the SOP! 🔪

Day-2: Understanding the SOP! 🔪

6
Comments
2 min read
Day-1: Understanding Base64

Day-1: Understanding Base64

13
Comments 2
2 min read
Isolate Your Games, Seriously

Isolate Your Games, Seriously

10
Comments
4 min read
Building a Pentest lab with Docker

Building a Pentest lab with Docker

20
Comments 1
6 min read
Use your Yubikey to its Fullest

Use your Yubikey to its Fullest

27
Comments 4
9 min read
Week 3: Introduction to John the Ripper

Week 3: Introduction to John the Ripper

6
Comments
5 min read
Week 2: Knowing the penetration testing steps

Week 2: Knowing the penetration testing steps

18
Comments 1
4 min read
loading...