<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7-beta'-->
<!--Jetpack_Sitemap_Buffer_Page_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//securitycafe.ro/sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 <url>
  <loc>https://securitycafe.ro/</loc>
 </url>
 <url>
  <loc>https://securitycafe.ro/about/</loc>
  <lastmod>2022-08-01T07:14:26Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/security-services-for-business/</loc>
  <lastmod>2023-02-16T20:46:08Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/contact/</loc>
  <lastmod>2015-01-15T14:21:03Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2014/12/16/how-to-install-android-5-0-1-lollipop-on-samsung-galaxy-s4/</loc>
  <lastmod>2015-01-15T16:15:16Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2014/12/19/how-to-intercept-traffic-from-java-applications/</loc>
  <lastmod>2017-02-09T09:15:28Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/01/05/understanding-php-object-injection/</loc>
  <lastmod>2017-03-14T11:40:47Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/01/05/penetration-testing-benefits/</loc>
  <lastmod>2015-08-11T10:05:05Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/security-services-for-business/web-application-penetration-testing/</loc>
  <lastmod>2015-01-13T11:57:07Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/security-services-for-business/mobile-application-penetration-testing/</loc>
  <lastmod>2015-01-13T11:57:44Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/security-services-for-business/infrastructure-penetration-testing/</loc>
  <lastmod>2023-03-29T05:56:05Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/security-services-for-business/vulnerability-assessment/</loc>
  <lastmod>2015-01-07T13:10:17Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/01/28/intercepting-functions-from-statically-linked-libraries/</loc>
  <lastmod>2022-10-20T05:33:32Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/02/02/concerns-regarding-biometric-authentication/</loc>
  <lastmod>2015-02-19T11:32:05Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/02/18/when-cryptographic-api-design-goes-wrong/</loc>
  <lastmod>2015-02-19T08:53:49Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/02/23/bypassing-windows-lock-screen-via-flash-screensaver/</loc>
  <lastmod>2015-03-02T09:33:53Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/02/26/upgrade-your-dll-to-reflective-dll/</loc>
  <lastmod>2017-01-13T17:08:24Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/03/18/clickjacking-in-firefox-hello/</loc>
  <lastmod>2015-03-20T08:43:57Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/03/25/scripting-metasploit-in-penetration-test/</loc>
  <lastmod>2017-07-30T04:08:22Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/03/31/pentest-versus-vulnerability-scanning/</loc>
  <lastmod>2015-04-01T15:13:44Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/04/06/writing-a-metasploit-post-exploitation-module/</loc>
  <lastmod>2015-05-18T13:39:48Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/05/21/hacknet-2015/</loc>
  <lastmod>2015-05-27T22:25:28Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/07/08/mobile-penetration-testing-using-drozer/</loc>
  <lastmod>2016-09-20T09:46:58Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/07/31/netripper-smart-traffic-sniffing-for-penetration-testers/</loc>
  <lastmod>2015-09-02T06:50:49Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/08/06/pivoting-to-internal-network-via-non-interactive-shell/</loc>
  <lastmod>2017-06-07T14:54:42Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/08/12/my-first-defcon-experience/</loc>
  <lastmod>2015-09-03T21:20:42Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/09/14/owasp-bucharest-eee/</loc>
  <lastmod>2015-09-14T14:26:22Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/10/17/defcamp-2015/</loc>
  <lastmod>2015-10-22T11:25:11Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/</loc>
  <lastmod>2015-12-16T08:59:18Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2015/12/14/introduction-to-windows-shellcode-development-part-2/</loc>
  <lastmod>2019-07-12T19:22:05Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2016/02/15/introduction-to-windows-shellcode-development-part-3/</loc>
  <lastmod>2023-08-01T07:37:28Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2016/03/17/my-experience-with-the-oscp-certification/</loc>
  <lastmod>2017-06-19T17:56:24Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/01/04/penetration-testing-in-it-security-assurance-projects/</loc>
  <lastmod>2017-01-18T15:00:46Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/01/18/practical-jsonp-injection/</loc>
  <lastmod>2017-04-06T17:51:09Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/02/28/time-based-data-exfiltration/</loc>
  <lastmod>2017-03-03T13:51:06Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/06/26/going-further-with-responders-basic-authentication/</loc>
  <lastmod>2017-06-26T12:19:09Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/09/06/phishy-basic-authentication-prompts/</loc>
  <lastmod>2017-09-06T14:21:52Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/09/22/robot-hacking-research/</loc>
  <lastmod>2017-10-02T09:40:44Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2017/11/03/tricking-java-serialization-for-a-treat/</loc>
  <lastmod>2017-11-14T12:31:44Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2021/10/01/practical-graphql-attack-vectors/</loc>
  <lastmod>2021-10-01T07:50:33Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2021/12/02/protecting-windows-credentials-against-network-attacks/</loc>
  <lastmod>2023-11-18T21:42:13Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2021/09/01/identifying-vulnerabilities-and-potential-victims/</loc>
  <lastmod>2022-02-17T14:19:04Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2021/11/01/how-to-get-your-first-cve/</loc>
  <lastmod>2022-02-17T14:15:06Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/02/01/root-detection-and-ssl-pinning-bypass/</loc>
  <lastmod>2022-02-17T10:14:39Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/03/07/runtime-mobile-security-rms-how-to-instrument-android-java-classes-and-methods-at-runtime/</loc>
  <lastmod>2022-03-07T08:51:54Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/10/04/practical-network-penetration-tester-pnpt-real-life-penetration-testing-exam-tips-tricks-to-pass-the-exam/</loc>
  <lastmod>2022-10-04T05:37:59Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/04/08/iot-pentesting-101-how-to-hack-mqtt-the-standard-for-iot-messaging/</loc>
  <lastmod>2023-12-04T08:39:29Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/03/24/gone-phishing-part-1/</loc>
  <lastmod>2022-03-23T14:34:29Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/04/29/pentesting-azure-recon-techniques/</loc>
  <lastmod>2024-11-15T16:25:45Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/06/06/security-source-code-review-manual-approaches/</loc>
  <lastmod>2022-06-05T08:19:37Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/05/16/active-directory-delegation-based-attacks-2/</loc>
  <lastmod>2022-05-16T08:39:13Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/07/01/web-cache-deception-attacks/</loc>
  <lastmod>2022-06-21T18:08:06Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/08/01/certified-hybrid-multi-cloud-red-team-specialist-review-and-tips/</loc>
  <lastmod>2023-01-30T12:03:16Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/11/01/aws-enumeration-part-1/</loc>
  <lastmod>2022-10-28T14:07:49Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/09/05/mobile-pentesting-101-bypassing-biometric-authentication/</loc>
  <lastmod>2022-08-29T09:12:23Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2022/12/14/aws-enumeration-part-ii-practical-enumeration/</loc>
  <lastmod>2022-12-12T20:32:37Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/01/17/aws-post-explitation-with-ssm-sendcommand/</loc>
  <lastmod>2024-08-23T07:20:39Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/04/03/mobile-pentesting-101-how-to-set-up-your-android-environment/</loc>
  <lastmod>2023-04-30T06:07:03Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/03/08/ec2stepshell-reverse-shells-private-ec2-instances/</loc>
  <lastmod>2023-03-08T04:58:19Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/02/01/our-defcamp-2022-talks-are-here/</loc>
  <lastmod>2023-01-25T14:43:37Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/02/27/a-complete-kubernetes-config-review-methodology/</loc>
  <lastmod>2023-11-27T11:19:42Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/04/19/7-lesser-known-aws-ssm-document-techniques-for-code-execution/</loc>
  <lastmod>2023-04-20T03:39:28Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/05/02/bypassing-application-whitelisting/</loc>
  <lastmod>2023-04-26T08:03:49Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/05/15/ai-hacking-games-jailbreak-ctfs/</loc>
  <lastmod>2026-02-19T15:19:00Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/06/12/mobile-pentesting-101-how-to-set-up-your-ios-environment/</loc>
  <lastmod>2023-06-27T07:21:16Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/</loc>
  <lastmod>2023-10-13T07:45:50Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/10/30/passing-your-oscp-in-2023-or-2024/</loc>
  <lastmod>2023-12-15T15:38:08Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/07/03/command-and-control-frameworks-metasploit-and-havoc/</loc>
  <lastmod>2023-06-23T12:30:15Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/07/27/iamactionhunter-in-action/</loc>
  <lastmod>2024-04-21T08:44:13Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/cves-talks-and-tools/</loc>
  <lastmod>2025-02-28T16:40:49Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/09/18/mobile-pentesting-101-introducing-to-mmsf-massive-mobile-security-framework/</loc>
  <lastmod>2024-01-06T09:35:07Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/09/13/remote-code-execution-basics/</loc>
  <lastmod>2024-01-08T10:33:40Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/10/05/secure-your-mobile-world-a-guide-for-cyber-security-awareness-month/</loc>
  <lastmod>2023-12-18T11:17:12Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2023/10/16/trench-tales-the-college-account-takeover-that-never-happened/</loc>
  <lastmod>2023-12-15T15:40:58Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/02/19/winrar-rce-vulnerability-spotlight-apt29s-zero-day-tactics/</loc>
  <lastmod>2024-02-19T09:16:31Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/10/07/mobile-pentesting-101-how-to-install-split-apks/</loc>
  <lastmod>2026-04-03T12:06:52Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/02/07/can-someone-really-hack-traffic-lights/</loc>
  <lastmod>2024-02-07T07:55:10Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/03/12/how-to-install-ipa-files-on-iphone-without-jailbreak/</loc>
  <lastmod>2026-04-03T12:07:16Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/07/02/red-team-finds-a-way-exploiting-the-human-factor/</loc>
  <lastmod>2024-07-02T08:05:10Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/09/11/red-team-finds-a-way-insecure-by-design/</loc>
  <lastmod>2024-09-11T12:03:36Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/security-services-for-business/dora-tiber-exercises/</loc>
  <lastmod>2024-03-25T15:23:08Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/</loc>
  <lastmod>2026-03-04T10:39:43Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/05/08/aws-cloudquarry-digging-for-secrets-in-public-amis/</loc>
  <lastmod>2024-12-10T06:48:11Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/10/25/chained-vulnerabilities-in-web-applications/</loc>
  <lastmod>2026-03-23T11:01:57Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/07/29/an-ex-psychologists-journey-into-cyber-security/</loc>
  <lastmod>2024-07-29T11:28:02Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/09/03/aws-vs-azure-a-secure-by-default-comparison/</loc>
  <lastmod>2026-02-19T15:10:00Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2024/11/19/azure-cloudquarry-searching-for-secrets-in-public-vm-images/</loc>
  <lastmod>2026-02-19T15:03:21Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2025/07/16/mobile-pentesting-101-how-to-pull-apks-from-work-profile-a-real-world-intune-challenge/</loc>
  <lastmod>2026-04-03T12:04:17Z</lastmod>
 </url>
 <url>
  <loc>https://securitycafe.ro/2026/02/02/mobile-pentesting-101-the-death-of-adb-backup-modern-data-extraction-in-2026/</loc>
  <lastmod>2026-04-03T12:03:05Z</lastmod>
 </url>
</urlset>