Secjuice

NON-PROFIT CYBER GOODNESS

  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
CYBERSEC

Power Grid Vulnerabilities

Smart grid technology presents an opportunity for threat actors seeking to disrupt the power grid.

  • Dustin Warren {Obtuse Moose}
    Dustin Warren {Obtuse Moose}
7 min read
TECHNICAL

HTB Pandora Walkthrough

A technical walkthrough of the HackTheBox Pandora challenge, by HTB Legend Andy From Italy.

  • Andy74
    Andy74
35 min read
TECHNICAL

CVE-2022-24112 Exploiting HTTP Request Smuggling

Header smuggling is the art of running commands on the target server by playing around with HTTP headers.

  • Gurkirat Singh
    Gurkirat Singh
4 min read
INFOSEC

A Criminal Vulnerability Disclosure

The story of German hacker Lilith Wittmann who ran into trouble with the law after finding a security vulnerability.

  • Lucia Ziesler
    Lucia Ziesler
3 min read
INFOSEC

Application Security 101

A short guide to application security aimed at newcomers to the subject.

  • Cyril James
    Cyril James
5 min read
CYBERSEC

Meet the Ransomware Gang Behind The Biggest Supply Chain Hacks

A gang nicknamed Cl0p, FIN11, and TA505 has been hacking and extorting hundreds of companies for years.

  • Sajawal Hanif
    Sajawal Hanif
7 min read
TECHNICAL

HTB Paper Walkthrough

A technical walkthrough of the HackTheBox Paper challenge, by Andy From Italy.

  • Andy74
    Andy74
26 min read
CYBERSEC

Why You Should Invest In Cybersecurity Startups

A cybersecurity startup founder explains why you should invest in cybersecurity startups.

  • Guise Bule
    Guise Bule
6 min read
INFOSEC

How To Market Your Cyber Startup

One of the often-neglected sides of the tech industry is understanding how to market yourself and your product.

  • Shimon Brathwaite
    Shimon Brathwaite
3 min read
TECHNICAL

HTB Unicode Walkthrough

A technical walkthrough of the HackTheBox Unicode challenge, by Andy From Italy.

  • Andy74
    Andy74
23 min read
CYBERSEC

Start Your Pentest In The Right Way

To increase your chances of success and keep yourself out of trouble, hosting a kickoff meeting before starting a pen test is essential.

  • ManhNho
    ManhNho
4 min read
INFOSEC

User Account Control Bypass For Windows 11 & Windows Server 2022

Security researcher Patrick Hoogeveen cracks open Windows UAC to bypass it for your viewing pleasure.

  • x0xr00t
    x0xr00t
5 min read
INFOSEC

The Zero Trust Handbook (1)

A high level introduction to the zero trust cybersecurity movement explained in layman’s terms.

  • Guise Bule
    Guise Bule
6 min read
TECHNICAL

HTB Backdoor Walkthrough

Andy From Italy is back with another solid HackTheBox technical write up, this time he heads for the BACKDOOR.

  • Andy74
    Andy74
21 min read

Breaking Reverse Proxy Parser Logic

Security researcher Blake Jacobs teaches us how to break reverse proxy parser logic to redirect server traffic.

  • Blake Jacobs
    Blake Jacobs
6 min read

How Copy Pasting Can Get You Hacked

Ctrl C + Ctrl V is an unsung hero to every programmer and sysadmin out there and an elementary and universal keyboard combination integrated into the core of every OS ecosystem. I have used

  • Debarshi Das
    Debarshi Das
2 min read
OSINT

OSINT Bites 1 - Architecture

Part 1 of Luca Ziesler’s OSINT Bites Collection focuses on architecture and the role it plays in geolocation.

  • Lucia Ziesler
    Lucia Ziesler
3 min read
TECHNICAL

Funny Deadly Linux Strings Part 2

Security researcher Patrick Hoogeveen returns with part two of his series on deadly little Linux strings.

  • x0xr00t
    x0xr00t
3 min read
INFOSEC

We Are All Hacktivists Now

Our adversaries allow cybercrime groups to flourish within their borders, while we demonize our hacker communities.

  • Guise Bule
    Guise Bule
4 min read
TECHNICAL

HTB Devzat Walkthrough

A technical walk through of the HackTheBox DEVZAT challenge, by Andy From Italy.

  • Andy74
    Andy74
32 min read
TECHNICAL

HTB Driver Walkthrough

A technical walk through of the HackTheBox DRIVER challenge, by Andy From Italy.

  • Andy74
    Andy74
23 min read
INFOSEC

The CIA Triad

The CIA Triad may sound like an unholy alliance of the CIA and Chinese gangsters, but is actually good practice.

  • Alesanco
    Alesanco
12 min read
TECHNICAL

Funny Deadly Linux Strings

Security researcher x0xr00t Likes to play around with funny encoding strings that execute directly after decrypt.

  • x0xr00t
    x0xr00t
2 min read
INFOSEC

Legality & The IT Army Of Ukraine

Hundreds of thousands of infosec professionals signed up for cyberwar without realizing it might make them cyber combatants.

  • Guise Bule
    Guise Bule
6 min read
INFOSEC

DeTy: A Website For The Missing People Of Ukraine

De Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.

  • Guise Bule
    Guise Bule
3 min read
Secjuice © 2022
Linkedin Facebook Twitter Remote Browser Isolation