JWT Attacks

JSON Web Tokens (JWT) are a format for sending cryptographically signed JSON data between systems. In theory, they can contain any type of data, but are most commonly used for...

Insecure CORS Policy

Cross-Origin Resource Sharing (CORS) is a browser mechanism that allows controlled access to resources outside a given domain. It extends and adds flexibility to the same-origin policy (SOP). However, it...

How to install Kubernetes

Kubernetes is an open source software developed to manage and automate the operation of container virtualisation tools.

CSRF Attacks

CSRF attacks (Cross-site request forgery) is a type of malicious exploit that aims to perform unauthorized operations that will be executed by a user that the website trusts.

XXE Attacks

XXE (XML External Entity) attacks are vulnerabilities that arise in applications that parse XML input. Thanks to this an attacker could alter the XML data in the request to execute...

The vulnerability that opened the door

CTF challenge about a system intrusion