Network Administration

Technical Support

Cyber Security

Bypassing Encoded References: The Hidden Code and How It Can Be Cracked

Some developers mess up
and put their functions on the front,
Forgetting it be hackers just like us who like to hunt.

My Reflection On Command Injection- Part One

I put the hack to poetry
they tell me it’s not literal,
so let’s attack a type of vuln
that’s known as critical.

Injection….

From The Top Back Down To the PJPT

No matter how rational it may seem to seek other sources of training while attempting to accomplish the above task, save yourself the time and don’t. You will become the very definition of Scope Creep!

No longer shall we dwell, with W-S-D-L

It should never be
be accessible,
But did the dev
try to hide it in an uncommon location?
Is the question though.

The Practical Junior Web Tester: We’ve Arrived

With TCM, the real learning took place “within the exam itself“. The best I can come to describing what I mean by that is comparing it to OJT- On The Job training. I was able to learn “how” to become a web application penetration tester “while on” a web application engagement for a client.

There’s Still A Little Confusion Over Local File Inclusion

Right now
your pulse is low,
but you’ll be racing
in a second
Cause trying to find a bug is getting hectic.

My Confusion Over Local File Inclusion

If our functions
are not coded
with
security in mind,
Attackers can manipulate
parameters to find

content
of a local file
that is hosted on the server,
We’re scoping L-F-I
vulnerabilities to merger.

Will The Real Sheryl Underwood Please Stand Up?

It’s repercussions,
Here on X cause half these follows
Be bots,
That’s why most hackers,
Chose to follow those
Who prove that they not.

API: A Poetic Interpretation of Broken Access Control

Let’s get some information,
About the Cats Facts
A P I,

Some devs be thinking
they can stop this hacking
so they try.

Authentication and Authorization Attacks – Part 2

Identify the weaknesses
before they reach production,
Cause IDOR vulnerabilities
Don’t need no introduction.

If a user somehow
can access the pages that’s restricted,
This may lead to the elevation
of that user’s privilege.

Answers to Your Questions

What is Grey Hat Developer?

Grey Hat Developer is a company that offers managed IT services. We also offer IT and Cyber-Security training to those who request us to provide it.

Isn’t “Grey Hat” a hacker term?

Yes, that is correct.  While we do embrace the spirit of such term in the sense that we believe that hacking isn’t good nor evil, that isn’t what Grey Hat Developer is about. We see IT and Cyber-Security skills as a viable path for someone to forge a very promising future for themselves. Unfortunately one mishap in someone’s past could derail that person from ever having a career as a White Hat Hacker. But that doesn’t mean that person should turn to the allure of becoming a Black Hat Hacker.  So that’s where that grey area has become a part of our philosophy. We have witnessed Cyber-Security completely change a person’s life around. That fueled us with inspiration and Grey Hat Developer was born.

Will you teach my child to hack?

No. Your child already knows how to hack. 🙂

How do I sign up for training and what do I need?

Signing up is simple. Just contact us and let us know that you’re interested. One of our reps will guide you through the on-boarding process. In most cases, all you’ll need is a solid internet connection, a compatible device, the patience of Job, and the desire to learn.

Are your services expensive, there aren’t any rates listed on any of your products or services?

As mentioned, we understand that everyone’s budget and requirements are unique. At this time there are no “fixed” prices on any of our services. We aim to get a feel for your project as a whole before we throw any numbers in your face. Contact us for a quote on your next project or idea.

Grey Hat Developer

Office

704 W. 15th Street
San Angelo, Tx. 76903

Hours

M-F: 8am - 10pm
Sat. 10am - 3pm

S: Closed

Call Us

(432)212-8959