Brute-Forcing Two-Factor Authentication | Exploiting Authentication and Access Control Mechanisms with Burp Suite [FREE COURSE CONTENT]

Just your average information security researcher from Delaware US.

In this video tutorial, you will see how to bypass multi-factor authentication with brute-force attacks. It is a part of

Read more

A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain

Just your average information security researcher from Delaware US.

Note: The three vulnerabilities discussed in this blog were all fixed in Samsung’s March 2021 release. They were fixed as

Read more

Everything you need to know about the OpenSSL 3.0.7 Patch

Just your average information security researcher from Delaware US.

Vulnerability Details The vulnerability is a buffer overflow in the X.509 certificate verification, which is the code used to validate

Read more