Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Author: Adrian Tuchel

Chained Vulnerabilities in Web Applications

October 25, 2024 Adrian Tuchel

Introduction Vulnerability chaining, also known as exploit chaining, is the process of combining multiple vulnerabilities to achieve a more significant or impactful attack. In complex

Continue reading

CVE-2024-28344 & CVE-2024-28345 in Sipwise C5

March 21, 2024 Adrian Tuchel

Update The vulnerabilities are also present on the latest version of Sipwise C5 mr12.2.1. CVE-2024-28344 – Open Redirect An Open Redirect vulnerability was found in

Continue reading

Can Someone Really Hack Traffic Lights?

February 7, 2024 Adrian Tuchel

We’ve all seen the scenes in movies or games where attackers hack traffic lights to set the colors to their liking, but could this scenario

Continue reading

Top Posts

  • Introduction to Windows shellcode development – Part 3
  • Introduction to Windows shellcode development - Part 1
  • Mobile Pentesting 101 – The Death of ADB Backup: Modern Data Extraction in 2026
  • My experience with the OSCP certification
  • When AI Understands Code: Prompt Injection to RCE

Blog Stats

  • 665,509 hits

Follow us via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (14)
  • IT Security Assurance (1)
  • IT Security Audit (3)
  • Metasploit (1)
  • Misc (21)
    • Artificial Intelligence (2)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (30)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Powered by WordPress.com.
 

Loading Comments...