Blog
Tags
Popular tags
April 12, 2026
SMB Relay Attack - Man in the Middle
Learn how to perform an SMB relay attack by intercepting NTLM authentication and redirecting credentials to gain access to target systems.
April 1, 2026
Extracting Video from RTP Streams Using Wireshark
A comprehensive guide to intercepting and extracting video streams from RTP packets using Wireshark in a Man-in-the-Middle scenario.
February 5, 2026
IP Camera Penetration Testing Guide
Comprehensive guide to identifying and testing IP camera vulnerabilities, including reconnaissance techniques, exploitation methods, and remediation strategies.
August 28, 2024
What is XSS (Cross-Site Scripting)
Cross-Site Scripting (XSS) vulnerabilities remain one of the most prevalent web security risks, allowing attackers to inject malicious scripts into trusted websites. This article explores the types, impacts, and mitigation strategies for XSS attacks.