Slide Offensive Security Specialists hn security



Red Teaming

Red teaming is the practice of […]

Application Assessment

For almost all organizations, data is what […]

System Assessment

Applications store, process, and transmit mission-critical […]

Network Assessment

Applications and servers are the fundamental […]

IoT Assessment

The Internet of Things (IoT) describes the network […]

SCADA/ICS Assessment

Supervisory control and data acquisition (SCADA) […]

Banking/Fintech Assessment

Financial services are the economic services provided […]

Platform Assessment

Security should not be an afterthought. […]

7 September 2022

Groovy Template Engine Exploitation – Notes from a real case scenario

Java web applications are far from […]

22 August 2022

Useless path traversals in Zyxel admin interface (CVE-2022-2030)

During our analysis of Zyxel’s device […]

5 August 2022

A journey into IoT – Unknown Chinese alarm – Part 3 – Radio communications

Disclaimer: as many other security researchers […]

26 July 2022

Zyxel authentication bypass patch analysis (CVE-2022-0342)

A few months ago, new firmware […]