Secure coding

How to exploit Cryptography errors in applications

In the previous articles of this series on Cryptography errors, we discussed how Cryptography is used in applications and how the use of Cryptography can go

How to exploit race conditions

Race conditions vulnerabilities can exist in applications that contain parallel processing. These vulnerabilities exist if multiple threads of execution do n

Email-based attacks with Python: Phishing, email bombing and more

The ability to send emails using an automated software tool such a python script can be useful in performing mass email based phishing attacks. This article

Attacking Web Applications With Python: Recommended Tools

Python is a powerful scripting language and it is used in developing several real world tools that are heavily used by security professionals. This article p

Attacking Web Applications With Python: Exploiting Web Forms and Requests

This article is to introduce web application penetration testers with python and explain how python can be used for making customized HTTP requests – which i

Attacking Web Applications With Python: Web Scraper Python

Web scrapers are useful in extracting information from websites. This article provides an overview of what web scrapers are and how they are related to OSINT

Python for Network Penetration Testing: Best Practices and Evasion Techniques

Being stealthy is one of the most important aspects of a network penetration test. There will often be intermediary devices like IDS and IPS which can trigge

Python for network penetration testing: Hacking Windows domain controllers with impacket Python tools

Impacket is one of the most popular tools available for Network Penetration testing. This toolset is a great example of the power of python in network penetr

Python Language Basics: Variables, Lists, Loops, Functions and Conditionals

Python Python is a general purpose high-level, object-oriented, interpreted programming language. Python was created by Guido van Rossum around 1990 and tod

How to Mitigate Poor HTTP Usage Vulnerabilities

In the last few articles, we discussed how HTTP is used and how various types of attacks can be introduced due to the poor use of HTTP. We have also seen a p