Setting Up a Personal Cloud with Nextcloud: Is It Worth the Effort?

Date: 09/07/2025

“Should I install some software to make it easier to organize files on the server, share them, and access them from my phone?” I thought, and that’s when everything started to unfold! Even though my initial needs were modest, I decided to first take a look at Nextcloud—a personal cloud platform that not only replaces Dropbox but also does a bunch of other things, including document editing and even downloading torrents and videos from YouTube.
Read full article →


You won’t escape! Hijacking user sessions in Windows

Date: 08/07/2025

How often do you encounter a much-desired domain admin session on an outdated Windows 7 workstation? In the hands of a hacker pentester, this admin account is a ‘master key’ that can unlock the entire network. But imagine that an evil antivirus prevents you from dumping LSASS. What would you do in such a situation? How to hijack a user session bypassing all security mechanisms?
Read full article →


OAuth from top to bottom. Examining protocol features and basic attacks targeting OAuth

Date: 23/06/2025

Most modern websites have an authentication form, and in its lower part you can often see buttons enabling you to sign in via various social networks. This login mechanism is based on the OAuth protocol, and today you’ll learn its structure and main vulnerabilities. At the end, you’ll solve two laboratory tasks to solidify the newly-gained knowledge.
Read full article →