Intercepting Web Requests

Intercepting Web Requests

Intercepting Web Requests31MAY, 2022Days 8 -11Intercepting Web Requests100 Days of HackingOne of the things that a good vulnerability researcher, pen tester, or bug hunter will need is a solid grasp of tools used in the craft. While tools are plentiful, most are...

read more
WordPress Security Assessment

WordPress Security Assessment

BB JOB ROLE PATH - HTBWordPress Security AssessmentQuintius, Day 7 , 100 Days of Hacking22 March 2016Day 7 of the journey served to tie everything learned in Day 6 together. Still navigating my way down the Bug Bunty Job Path role, it’s now time to tackle the...

read more
Hacking WordPress 101

Hacking WordPress 101

Hacking WordPress 10125MAY, 2022Day 6Hacking WordPress 101100 Days of HackingInstead of moving linear through the Bug Bunty Path on HTB, I wanted to veer off path a sec and jump ahead to Hacking Wardress. With a user base that stretches as far and wide as WordPress...

read more
Analyzing Unknown Binaries- Dynamically

Analyzing Unknown Binaries- Dynamically

Analyzing Unknown Binaries- DynamicallyQuintius, Day 2, 100 Days of Hacking22 May 2022When I said this journey was not going to be linear in nature, Day 2 is an example of that. Although I’m writing this on Day 5, the events occurred on Day 2. My initial curiosity was...

read more
Sensitive Data Exposure and HTML Injection

Sensitive Data Exposure and HTML Injection

Sensitive Data Exposure & HTML Injection21MAY, 2022Days 3 & 4Sensitive Data Exposure & HTML Injection100 Days of HackingToday I’ll be trotting along the adventurous Bug Hunting path. I’m forcing myself to empty all previous knowledge that I possess about...

read more
Listing the database contents on non Oracle databases

Listing the database contents on non Oracle databases

SQL INJECTION ATTACKListing database contents on  non Oracle DatabasesQuintius, Day 1, 100 Days of Hacking18 May 2022This is officially Day Two, but since it’ll be the first day writing about what I covered, we’ll let this be the official Day One. I'll start by...

read more
100 Days of Hacking

100 Days of Hacking

100 Days of Hacking16MAY, 2022I've been away from pen testing specifically since about the first of the year. As much as I abhorred the fact of having to take a hiatus, I must admit that taking that long of the break, ironically, had its benefit. Namely, coming back...

read more
The Twelve Keys of the Hacker’s Craft

The Twelve Keys of the Hacker’s Craft

The Twelve Keys Of The Hacker's CraftQuintius, Cybersecurity Consultant, Texas2 January 2022Photo by Markus Winkler on UnsplashI often post useful quotes to the timeline of my social media profiles. A visitor to my profile would find these quotes appearing often, in...

read more
What’s missing in Cybersecurity?

What’s missing in Cybersecurity?

Photo by Brittani Burns on UnsplashQuintius, Cybersecurity Consultant, Texas28 January 2022This post was inspired by three words- "women in tech". While the those words by themselves kind of just hangs in the air without any context, what transpired of them was rather...

read more
An Incidental Encounter with a Threat Actor

An Incidental Encounter with a Threat Actor

An Incidental Encounter with a Threat ActorQuintius, Cybersecurity Consultant, Texas17 January 2022As a healthy exercise in reconnaissance and utilizing an OSINT methodology, I found my guy, or entity, or account behind a shady email and penetration testing proposal....

read more

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This