Tagged articles
6 articles
Page 1 of 1
System Architect Go
System Architect Go
Mar 1, 2021 · Information Security

Server-side Request Forgery (SSRF)

This article explains what server‑side request forgery (SSRF) is, describes its impact, common attack vectors such as targeting the server itself or internal services, outlines bypass techniques for blacklist and whitelist filters, and discusses blind SSRF detection using out‑of‑band methods.

Information SecuritySSRFout‑of‑band
0 likes · 12 min read
Server-side Request Forgery (SSRF)
Programmer DD
Programmer DD
Jan 7, 2021 · Information Security

Explore Server‑Side Template Injection Labs: Tornado, Velocity & Freemarker

This article continues a series on server‑side template injection by presenting four hands‑on labs covering Tornado (Python), Velocity (Java), Freemarker (Java) and a Freemarker sandbox‑escape, detailing syntax basics, attack surfaces, exploit payloads, defensive measures, and step‑by‑step exercises.

Freemarkerpayloadserver-side
0 likes · 13 min read
Explore Server‑Side Template Injection Labs: Tornado, Velocity & Freemarker
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2017 · Information Security

How to Exploit and Secure Python's eval: Bypass Tricks and Whitelist Defenses

This article explains how Python's eval can execute arbitrary code, demonstrates multiple bypass techniques—including __import__, __builtins__ manipulation, and object subclass exploitation—and shows how to safely restrict eval using whitelist globals or ast.literal_eval to prevent code injection and denial‑of‑service attacks.

Code InjectionPythonWhitelist
0 likes · 9 min read
How to Exploit and Secure Python's eval: Bypass Tricks and Whitelist Defenses
Architect
Architect
Dec 11, 2015 · Information Security

Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline

The article presents a comprehensive technical analysis of a sophisticated Windows trojan that masquerades as a Word document, detailing its delivery method, file extraction process, registry modifications, remote‑control capabilities, and the organized, targeted attack infrastructure behind it.

C2 infrastructureInformation SecurityRemote access
0 likes · 10 min read
Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline