Technical
Resources Blog

Technical

Keep up to date with the latest offensive security news, knowledge, and resources.
Popping Printers: How Your MFPs Are Handing Attackers Domain Admin
Mar 23, 2026

Popping Printers: How Your MFPs Are Handing Attackers Domain Admin

Multifunction printers silently store domain credentials, expose unauthenticated management interfaces, and sit on flat networks. Learn how attackers exploit MFPs to achieve domain admin in minutes.
Starting Strong: Successful Onboarding with Sprocket Security
Mar 19, 2026

Starting Strong: Successful Onboarding with Sprocket Security

The fastest path from kickoff to testing starts with alignment, preparation, and the right people in the room.
Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs
Mar 10, 2026

Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs

Understanding how SiteGround’s proof-of-work CAPTCHA silently disrupts automated WordPress security scans and how to work around it.
Vulnerability Hunting a Retired App Part 1 - Auth Bypass
Mar 03, 2026

Vulnerability Hunting a Retired App Part 1 - Auth Bypass

Decompiling a retired .NET application reveals how a single middleware misconfiguration leads to full authentication bypass.
Putting the Token Before the Cart? A Guide on E-Commerce API Pentesting
Feb 26, 2026

Putting the Token Before the Cart? A Guide on E-Commerce API Pentesting

Why traditional API pentests miss real commerce risk and how cart tokens, checkout flows, and cross-layer auth gaps expose customer data.
LLMs Don't Follow Rules – They Follow Context
Feb 24, 2026

LLMs Don't Follow Rules – They Follow Context

LLM behavior isn't governed by a rulebook — it emerges from context, shaped by a stack of training, fine-tuning, and runtime instructions. Understanding this explains why the same model gives radically different responses to functionally identical requests.
1 2 3 4 5