by Alex Olsen | May 10, 2023 | Penetration Testing, Security
Pentesting is inherently time-consuming. This constraint alone has led to the rise of scanners as well as the exclusion of regular pentesting in many modern development lifecycles. Whilst we can’t automate and deliver everything at lightspeed, there are things we can...
by Alex Olsen | May 3, 2023 | Security, Web Applications
Clickjacking, also known as UI Redressing, is a technique that tricks users into clicking on unintended elements on a website. By using hidden elements, attackers deceive users into performing actions that they did not intend to carry out. Learn more about...
by Alex Olsen | Apr 26, 2023 | Web Applications
In 2023, there are more resources to learn new skills and progress than ever. However, this industry is also moving and growing rapidly, and more isn’t necessarily better. The phrase “drinking from a fire hose” comes to mind. Today we’re going to be looking at a path...
by Alex Olsen | Apr 19, 2023 | Web Applications
2023 Candidate List Broken Object Level Authorization Broken Authentication Broken Object Property Level Authorization Unrestricted Resource Consumption Broken Function Level Authorization Server Side Request Forgery Security Misconfiguration Lack of Protection From...
by Alex Olsen | Apr 12, 2023 | Web Applications
Broken Object Level Authorization (BOLA) is a vulnerability that occurs when an application fails to enforce access controls on sensitive data or resources. BOLA is important to understand and test for as it has been the most common and impactful vulnerability across...