
March 15, 2025
HTTP Request Headers as an Attack Vector – Partie Deux
Last time I have showcased a three interesting headers that can be used as attack vector. This time I will showcase a three more, however they will be more exotic that the previous examples. If you haven’t seen part 1, view it first here. Without further ado, let’s buckle up! Forcing HTTP Verb Tunneling In …...
February 18, 2025
HTTP Request Headers as an Attack Vector
Can misconfigured HTTP request headers be as dangerous as parameters sent to the server? The short answer is: absolutely. HTTP headers are...
January 5, 2025
My Journey to the Offensive Security Experienced Penetration Tester (OSEP) Certification
In November 2024, I successfully passed the OSEP exam and earned the Offensive Security Experienced Penetration Tester certification....
Penetration Testing
Red Teaming
Exploit Development
Malware Development
Reverse Engineering
Privilege Escalation Techniques
Lateral Movement & Persistence
Active Directory Attacks
Offensive Cloud Security
Mobile Application Exploitation
Active Directory Attacks
Web Application Exploitation
March 15, 2025
HTTP Request Headers as an Attack Vector – Partie Deux
Last time I have showcased a three interesting headers that can be used as attack vector. This time I will showcase a three more, however...
February 18, 2025
HTTP Request Headers as an Attack Vector
Can misconfigured HTTP request headers be as dangerous as parameters sent to the server? The short answer is: absolutely. HTTP headers are...
Social Engineering Attacks
Network Exploitation
C2 Frameworks
OSINT
Exams
January 5, 2025
My Journey to the Offensive Security Experienced Penetration Tester (OSEP) Certification
In November 2024, I successfully passed the OSEP exam and earned the Offensive Security Experienced Penetration Tester certification....