by Quintius | Nov 14, 2023 | Blog, cybersecurity
Will The Real Sheryl Underwood Please Stand Up? Quintius Walker, Grey Hat Developer, Cybersecurity Consultant 14 November 2023 Absolutely everything on this blog that surrounds the term “hacking” is meant for training and educational purposes only. WE DO NOT...
by Quintius | Nov 3, 2023 | Blog, Bug Bounty, cybersecurity, OWASP Top 10
API- A Poetic Interpretation of Broken Access Control Quintius Walker, Grey Hat Developer, Cybersecurity Consultant 3 November 2023 Photo by Walter Gaspar on Unsplash Everything on this blog that surrounds the term “hacking” is used for training and educational...
by Quintius | Oct 24, 2023 | Blog, Bug Bounty, cybersecurity, OWASP Top 10
Part – 2 Authenication & Authorizaion Attacks Quintius Walker, Grey Hat Developer, Cybersecurity Consultant 23 October 2023 Photo by Markus Spiske on Unsplash Everything, and I mean absolutely everything on this blog that surrounds the term “hacking” is...
by Quintius | Mar 31, 2023 | Blog, cybersecurity, Penetration Testing
Grinding towards the PNPT: Windows Privilege Escalation- Part 1 31 March, 2023 Grinding towards the PNPT: Windows Escalation- Part 1 Photo by Johny Vino Greetings, Community! In this post we are still traveling the path to reach the goal that we had set earlier last...
by Quintius | Jan 28, 2023 | Blog, cybersecurity, Penetration Testing
Grinding towards the PNPT: Attacking Black Pearl 26 January, 2023 Grinding towards the PNPT: Attacking Black Pearl. Photo Creds – Barry Weatherall In this post we are still traveling the path to reach the goal that we had set earlier last year: To obtain the...
by Quintius | Dec 10, 2022 | Blog, cybersecurity, Penetration Testing
Grinding towards the PNPT: Attacking Dev 9 December, 2022 Grinding towards the PNPT: Attacking Dev Photo Creds – Hannah Xu In this post we are still traveling the path to reach the goal that we had set earlier this year: To obtain the Practical Network...