Hacker News
- A penetration tester’s guide to sub-domain enumeration https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6 32 comments
- Exploiting weak configurations in Amazon Cognito in AWS https://blog.appsecco.com/exploiting-weak-configurations-in-amazon-cognito-in-aws-471ce761963 3 comments aws
- Exploiting weak configurations in Amazon Cognito https://blog.appsecco.com/exploiting-weak-configurations-in-amazon-cognito-in-aws-471ce761963 3 comments netsec
- The Why-What-How of AWS EC2 Instance Metadata Service update adding defence in depth https://blog.appsecco.com/getting-started-with-version-2-of-aws-ec2-instance-metadata-service-imdsv2-2ad03a1f3650 6 comments aws
- Exploiting CSRF on JSON endpoints with Flash and redirects https://blog.appsecco.com/exploiting-csrf-on-json-endpoints-with-flash-and-redirects-681d4ad6b31b 3 comments netsec
- Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters https://blog.appsecco.com/static-analysis-of-client-side-javascript-for-pen-testers-and-bug-bounty-hunters-f1cb1a5d5288 4 comments netsec
- Open Source Intelligence Gathering 201 https://blog.appsecco.com/open-source-intelligence-gathering-201-covering-12-additional-techniques-b76417b5a544 4 comments netsec
- Using Google Cloud Platform to store and query 1.4 billion usernames and passwords(step-by-step setup) https://blog.appsecco.com/using-google-cloud-platform-to-store-and-query-1-4-billion-usernames-and-passwords-6cac572f5a29 13 comments netsec
- A penetration tester’s guide to sub-domain enumeration https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6 36 comments netsec