Honorable Hacking: How to Red Team Without Losing Your Soul
In this non-technical post, I talk about why red teaming doesn't have to turn you into the villain, discussed various non-technical aspects of responsible red teaming.
6 min read
Search for a command to run...
Exploring the art and science of offensive security
In this non-technical post, I talk about why red teaming doesn't have to turn you into the villain, discussed various non-technical aspects of responsible red teaming.
In this non-technical post, I talk about CVSS 3.0 scoring system and CIA triad, how it works, and how to determine the severity of a vulnerability.
In this post, I share the story of finding my first critical vulnerability—a misconfigured RavenDB with no authentication on a subdomain.