Skip to content

Cybersecurity, etc.

Pentesting and red teaming topics

  • Home
  • Pentesting
  • Red Team
  • Web
  • Contact

Author: dave

JSON Input Validation – Why?

November 5, 2025November 5, 20250

1. Security vulnerabilities a. Injection attacks Example: If used directly in an SQL string without sanitization, this could bypass authentication. b. Deserialization attacks Example:If your… JSON Input Validation – Why?Read more

What’s a DMZ?

May 13, 2025May 13, 20250

In cybersecurity, a DMZ (Demilitarized Zone) is a segmented network area that sits between an internal (trusted) network and an external (untrusted) network, typically the… What’s a DMZ?Read more

Encryption – Symmetric vs. Asymmetric

March 26, 2025March 26, 20250

Both symmetric and asymmetric encryption are cryptographic techniques used to secure data, but they differ in key management, speed, and use cases. 1. Symmetric Encryption… Encryption – Symmetric vs. AsymmetricRead more

Credential Stuffing vs. Password Spraying

March 26, 2025March 26, 20250

Both credential stuffing and password spraying are brute-force attack techniques used to gain unauthorized access to accounts, but they differ in execution and intent. 1.… Credential Stuffing vs. Password SprayingRead more

CSRF Demystified

March 19, 2025March 23, 20250

1. What is CSRF? Cross-Site Request Forgery (CSRF) is a web security vulnerability where an attacker tricks an authenticated user into unknowingly executing unwanted actions… CSRF DemystifiedRead more

HttpOnly & Secure HTTP Headers

March 12, 2025March 23, 20250

The HttpOnly and Secure flags are security attributes that can be set on cookies in HTTP response headers to enhance web application security. They help… HttpOnly & Secure HTTP HeadersRead more

AS-REP Roasting Explained

March 12, 2025March 15, 20250

AS-REP Roasting is a post-exploitation attack technique that targets user accounts in Active Directory (AD) that have the “Do not require Kerberos preauthentication” setting enabled.… AS-REP Roasting ExplainedRead more

XSS – What’s the worst-case scenario?

March 10, 2025March 23, 20250

Cross-Site Scripting (XSS) is often underestimated, but in real-world attacks, it can lead to complete account takeover, data theft, malware injection, and even full system… XSS – What’s the worst-case scenario?Read more

Posts pagination

1 2 Next →

Recent posts

  • JSON Input Validation – Why?
  • What’s a DMZ?
  • Encryption – Symmetric vs. Asymmetric
  • Credential Stuffing vs. Password Spraying
  • CSRF Demystified

Useful links

  • Rogue Labs
  • Sektor7
  • Web Security Academy
  • RedSeer Security

about racrx

Let's talk about all things cybersecurity - web/network pentesting and red teaming.

Categories

  • Misc. Security
  • Pentesting
  • Red Team
  • Web
- 2025 -
Powered by electricity | Theme: Apace by ThemezHut.