N7x

joined 2 years ago
[–] N7x@infosec.pub 1 points 3 months ago

Well done !

[–] N7x@infosec.pub 2 points 6 months ago

Oh nice, wasn't aware of this, definitely looks interesting, thanks! I am an OSCP holder as well.

 

Hello everyone,

I hope this post belongs here, otherwise I'll move it to !appsec@infosec.pub.

I work in appsec, my manager would like to send us to a conference this year. We are based in Europe, and the company would like to across intercontinental travel.

I have OWASP Global 2024 in Lisbon on my radar, as well as the BlackHat EU in London, is there any other conference you guys would recommend?

 

cross-posted from: https://lemmy.capebreton.social/post/82259

OSLO, July 24 (Reuters) - Twelve Norwegian government ministries have been hit by a cyber attack, the Norwegian government said on Monday, the latest attack to hit the public sector of Europe's largest gas supplier and NATO's northernmost member.

"We identified a weakness in the platform of one of our suppliers. That weakness has now been shut," Erik Hope, head of the government agency in charge of providing services to ministries, told a news conference.

The attack was identified due to "unusual" traffic on the supplier's platform, Hope said, declining to provide specifics. It was uncovered on July 12 and was being investigated by police.

"It is too early to say who is back this and what is the extent of the impact (of the attack)," he said.

 

RIP

[–] N7x@infosec.pub 4 points 2 years ago (2 children)

Finally done with my 120 CPEs for my CISSP. That was a long ride, happy to be done with it

[–] N7x@infosec.pub 2 points 2 years ago

Thank you for this!

[–] N7x@infosec.pub 4 points 2 years ago

Be careful, 2FA still has issues at the moment: https://github.com/LemmyNet/lemmy/issues/3309

[–] N7x@infosec.pub 1 points 2 years ago
[–] N7x@infosec.pub 2 points 2 years ago

Impressive list!

[–] N7x@infosec.pub 1 points 2 years ago

They should be fixed Indeed

[–] N7x@infosec.pub 4 points 2 years ago
 

You might have found HTML injection, but unfortunately identified that the site is protected with CSP. All is not lost, it might be possible to bypass CSP using DOM clobbering, which you can now detect using DOM Invader! In this post we'll show you how.

We've based the test case on a bug bounty site, so you're likely to encounter similar code in the wild. If you're unfamiliar with DOM clobbering then head over to our Academy to learn about this attack class and solve the labs.

 

A brand-new Burp Suite extension for discovering DNS vulnerabilities in web applications.

view more: next ›