The science behind learning is a fascinating field that’s constantly evolving. There is no single, definitive answer to what the most effective learning technique is, and if there was, it would likely vary from person to person. However, there are a number of...
JavaScript is a bit like Marmite, you either love it or hate it. Regardless of how it makes us feel, it is a powerful tool for attacking users and exploitation. Often, popping alert(1) is proof enough to get a fix but doesn’t demonstrate the full impact an attacker...
Hypertext Transfer Protocol (HTTP) is an application layer protocol. On the surface, HTTP can appear quite simple, but there are a lot of quirks considering its use across inconsistent browsers and servers. Breaking down an HTTP request For each request, we generally...
Target enumerated, check.Vulnerability identified, check.Tested payload delivery, check.RCE verified, check.Reverse shell…nope. Today we are going to look at some practical ways to troubleshoot your reverse shell. Some of these points come from logical thinking,...
Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...