Application Mobile Network
Network

AWS Penetration Testing Part 2. S3, IAM, EC2

Unlike ACLs and bucket policies, IAM policies are targeted at IAM users/groups instead of S3 buckets and objects.

Network

AWS Penetration Testing Part 1. S3 Buckets

Amazon Web Services (AWS) provides some of the most powerful and robust infrastructure for modern web applications.

Application

The jQuery Security Model Explained

jQuery is a JavaScript UI framework which provides an abstraction layer to many DOM manipulation functions.

Network

Wireless Penetration Testing Guide: Part 1 – Intro And Basics

Regardless if you work in Security, Compliance, IT, or management, it is a near 100% chance that you have encountered wireless networks in the enterprise before.

Application

Managing OpenSSH Patch Levels On Ubuntu

Many vulnerability scanners will raise false positives regarding outdated installations of OpenSSH on Ubuntu

Application

Understanding XSS Auditor

We see a lot of confusion regarding the X-XSS-Protection header and thought it might be worthwhile to go over exactly what this header is and what it isn’t.