Vulnerabilities of the TLS Protocol
Secure Socket Layer (SSL) and its successor, Transport Layer Security (TLS), are widely used protocols for secure online communication. They provide encryption and authentication between...
CWE
CWE (Common Weakness Enumeration) is a list of common types of hardware and software defects that have security implications. The CWE list can be used...
Vulnerability Analysis
A vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat...
Network Scanning
Regardless of your motivations (attacker or defender), you need to know the ports, hosts and services available within a network. From a defender's point of...
Footprinting
The first step in a cyberattack, or a penetration test, is footprinting. The attacker/analyst tries to get information about the targeted infrastructure. Thanks to footprinting...
Black Hat, White Hat, Gray Hat, Script Kiddies – Who they are?
The term hacker often takes on a negative connotation. In the past, we often focused on the distinction between a hacker, a person with deep...