Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: hacking

Chained Vulnerabilities in Web Applications

October 25, 2024 Adrian Tuchel

Introduction Vulnerability chaining, also known as exploit chaining, is the process of combining multiple vulnerabilities to achieve a more significant or impactful attack by exploiting

Continue reading

Can Someone Really Hack Traffic Lights?

February 7, 2024 Adrian Tuchel

We’ve all seen the scenes in movies or games where attackers hack traffic lights to set the colors to their liking, but could this scenario

Continue reading

IoT Pentesting 101: How to Hack MQTT – The Standard for IoT Messaging

April 8, 2022 Ionut Morosan

Pentesting IoT MQTT protocol on emulated environment deployed using mosquitto. Dictionary attacks, DoS, or exploiting dummy ICS Environments are presented.

Continue reading

Top Posts

  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • Mobile Pentesting 101: How to Install Split APKs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • Introduction to Windows shellcode development - Part 1
  • A Complete Kubernetes Config Review Methodology

Blog Stats

  • 552,910 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar