Selcouth Cyber Security Services Private Limited


14 Results / Page 1 of 2


Audit + Compliance + InfoSec Skrutin1 / January 27, 2021

Configuration Audit – Part one

Apart from general penetration tests, timely vulnerability management and hardened network access controls, one other method to protect your devices as well as getting them compliant to industry standards is configuration audit. In this blog post we will cover what exactly is a configuration audit, why it is important, the ...

AppSec + InfoSec + Web Attacks acc3ssp0int / January 22, 2021

OAuth 2.0 – Part one

At least once till date, you must’ve come across  sites that let you log in using your social media account [Facebook, LinkedIn, Google & various such platforms] The chances are that this feature is built using the well known OAuth 2.0 framework. This framework is liked by Pentesters because it ...

Exploit Writing + OSCP + StackOverflow acc3ssp0int / March 18, 2019

Smashing the Stack

Hi everyone, in this blog post I’ll be talking about how to perform a stack buffer overflow exploit, also practically demonstrating the exploit. But first, we’re going to talk about what a buffer overflow attack is and why it works the way it is. \x01 – Introduction I’ve spent quite ...