Open in app

Sign In

Write

Sign In

popalltheshells
popalltheshells

406 Followers

Home

About

Published in

InfoSec Write-ups

·Pinned

Multiple CVEs affecting Pydio Cells 4.2.0

Greetings hackers; just quickly wanted to share an advisory write-up that my team discovered in Pydio Cells 4.2.0. These have been disclosed and we have been in very close communication with the vendor. …

Vulnerability Research

3 min read

Multiple CVEs affecting Pydio Cells 4.2.0
Multiple CVEs affecting Pydio Cells 4.2.0
Vulnerability Research

3 min read


Published in

System Weakness

·Pinned

I asked 10 Hackers Their Favourite Ways to Break into Organizations

Hello all, I come bearing gifts once more. To all cybersecurity professionals (especially those at Management and C-level) — I asked my fellow hackers about their favourite ways to break into your network and here are their answers. …

Red Team

3 min read

I asked 10 Hackers Their Favourite Ways to Break into Organizations
I asked 10 Hackers Their Favourite Ways to Break into Organizations
Red Team

3 min read


Pinned

The 6 UGLY TRUTHS about Security Certifications

Here we are again, with yet another (possibly) controversial topic. This time is about security certifications. Regardless if you are in Cloud security, Forensics, Governance, Offensive Security, etc. at some point you may have felt the pressure to obtain the most sophisticated, the latest, and the very “best” of security…

Cybersecurity

3 min read

The 6 UGLY TRUTHS about Security Certifications
The 6 UGLY TRUTHS about Security Certifications
Cybersecurity

3 min read


Published in

System Weakness

·May 1

Bypassing image file upload restrictions [SUPER EASY]

Hi people, it’s me and I’m back with more stuff that I learned in a recent engagement. I was tasked with testing a client’s web application to identify potential security vulnerabilities. The application featured various functionalities, one of which was a file upload feature. …

Penetration Test

2 min read

Penetration Test

2 min read


Published in

System Weakness

·Apr 11

Cyrillic character for phishing domains

Hi everyone, it has been awhile since my last post. I’m here to bring you something that you may have heard (or not) in the past — relating to new technique to make your phishing campaign more effective. Comes Cyrillic character. For those of you who don’t know; Cyrillic characters…

Red Team

2 min read

Cyrillic character for phishing domains
Cyrillic character for phishing domains
Red Team

2 min read


Mar 9

City of Oakland data is leaked! PLAY Ransomware

Your daily FLASH NEWS on Cyber Security: If you have yet to care about cybersecurity, is this the best time to do so? Recently, the PLAY Ransomware gang leaks about 12GB worth of data belonging PII information including SSN, address, employee ID, etc. …

Ransomware

1 min read

City of Oakland data is leaked! PLAY Ransomware
City of Oakland data is leaked! PLAY Ransomware
Ransomware

1 min read


Mar 7

I asked 11 hackers how they felt when they compromised their first Domain Admin.

Hi everyone, it has been awhile since I had last deliver to you some interesting content. This time, I have one question I asked my fellow hackers (some had requested to remain anonymous). Question of the month is “In 3 words, how would you describe your feelings when you compromised…

Red Team

1 min read

Red Team

1 min read


Feb 9

A new stream of Cybersecurity : design and visualization

You don’t need to be a technical guru to contribute to the cybersecurity field, on this post we get to hear a story of a co-worker, a friend of mine on their journey into Cyber Threat Intelligence — who made it their mission to raise awareness on the importance of…

Design In Securit

3 min read

A new stream of Cybersecurity : design and visualization
A new stream of Cybersecurity : design and visualization
Design In Securit

3 min read


Published in

System Weakness

·Jan 6

If you’re a penetration tester, DO THIS NOW!

Hi all this is something that I hope can resonate with everyone. Developing tools as a penetration tester will deepen your understanding about specific technology which will help you in the long run. In order to break things, you must understand how those things work. …

Red Team

3 min read

If you’re a penetration tester, DO THIS NOW!
If you’re a penetration tester, DO THIS NOW!
Red Team

3 min read


Published in

System Weakness

·Dec 20, 2022

Grouping your penetration testing artifacts [the art of organized testing]

Storing testing artifacts and screenshots is important for several reasons. Firstly, it allows for the documentation and analysis of the testing process. This includes tracking the steps taken during the testing, recording any vulnerabilities or weaknesses discovered, and documenting the methods used to exploit those vulnerabilities. Secondly, it helps to…

Tool Development

2 min read

Grouping your penetration testing artifacts [the art of organized testing]
Grouping your penetration testing artifacts [the art of organized testing]
Tool Development

2 min read

popalltheshells

popalltheshells

406 Followers

Unauthorized

Following
  • Matthew Gunawan

    Matthew Gunawan

  • magnologan

    magnologan

  • Dionysius Indraatmadja

    Dionysius Indraatmadja

See all (5)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams