General

Latest posts

Search Engines for Reconnaissance

Search Engines for Reconnaissance

In order to simulate a cyber attack on an application or a network, the pentester needs access to information about the target. They gather this information in the reconnaissance stage.  Whether a hacker wants to target an entire network or a...

CVE-2021-44228 - Log4j

CVE-2021-44228 - Log4j

A few hours ago, a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string.