All posts

Hacking banks for fun and profit:

https://ret2libc.wordpress.com/2016/01/03/hacking-banks-for-fun-and-profit/

 

A tale of eBay XSS and shoddy incident response:

https://ret2libc.wordpress.com/2016/01/11/a-tale-of-ebay-xss-and-shoddy-incident-response/

 

Military audits are necessary:

https://ret2libc.wordpress.com/2016/01/20/military-audits-are-necessary/

 

An intro to advanced phishing techniques:

https://ret2libc.wordpress.com/2016/02/01/an-intro-to-advanced-phishing-techniques/

 

Using Facebook domain to serve malware:

https://ret2libc.wordpress.com/2016/03/22/using-facebook-domain-to-serve-malware/

 

A beginners guide to bug bounties:

https://ret2libc.wordpress.com/2016/03/22/a-beginners-guide-to-bug-bounties/

 

Analysing SWF files for vulnerabilities:

https://ret2libc.wordpress.com/2016/04/04/analysing-swf-files-for-vulnerabilities/

 

Advertisements