Network Protocol Analysis: Wireshark and tcpdump

Explore network protocol analysis using Wireshark & tcpdump for packet capture, filtering, dissection, and real-world pen testing scenarios.

June 9, 2023 · 9 min · UncleSp1d3r

Advanced Cloud Security: Serverless Security and Misconfiguration

This article delves into advanced cloud security, focusing on serverless security and misconfiguration, providing valuable insights and tools for securing serverless applications, addressing function-level, resource-level, and infrastructure-level misconfigurations, and offering real-world examples and tools to help red teams and pen testers enhance serverless security.

June 2, 2023 · 8 min · UncleSp1d3r

Advanced Network Security: Application Layer Firewalls

This article explores the concept of application layer firewalls, how they work, their importance in network security, and some tools used to test them.

May 15, 2023 · 18 min · UncleSp1d3r

Blue Team Exercises: Threat Hunting and Incident Response

This article explores various open-source and commercial tools and techniques used in blue team exercises, threat hunting, and incident response, with a focus on providing technical details and examples for an advanced audience of experienced security professionals.

May 5, 2023 · 34 min · UncleSp1d3r

Advanced Memory Forensics: Analysis Techniques

This article explores advanced memory forensics techniques for detecting malicious activity in memory, including process timelining, high-low level analysis, walking the VAD tree, and detecting rogue processes, kernel-level rootkits, DLL hijacking, process hollowing, and sophisticated persistence mechanisms.

May 2, 2023 · 37 min · UncleSp1d3r

Web Application Security: CSRF and XSS Prevention

This article explores the prevention techniques for Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) attacks in web applications, providing real-world examples, and includes code samples in various web programming languages.

May 1, 2023 · 38 min · UncleSp1d3r

Advanced Network Security: Intrusion Prevention Systems (IPS)

This article provides advanced technical details on Intrusion Prevention Systems (IPS), including what they are, how they work, tools and techniques for testing them, and specific examples of open source and commercial IPS systems.

April 24, 2023 · 16 min · UncleSp1d3r

Cloud Security: Best Practices and Common Vulnerabilities

This article provides an overview of best practices for cloud security, including secure access to the cloud, encryption to protect data, keeping software up to date, monitoring cloud resources for security events, and using network security best practices, with specific technical examples for AWS, GCP, and Azure.

April 21, 2023 · 27 min · UncleSp1d3r

Firewall Bypass Techniques: Tools and Best Practices

This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.

April 3, 2023 · 11 min · UncleSp1d3r

Advanced Web Application Attacks: CSRF and XXE

This article explores the advanced web application attacks of CSRF and XXE, including real-world examples, traffic samples, and mitigation techniques for red teamers and pen testers. These vulnerabilities are often overlooked but are critical in enterprise applications.

March 31, 2023 · 8 min · UncleSp1d3r