Bishop Fox Blog / Category - Technical

Portswigger is back with a brand new invention The newest addition to the much beloved Burp Suite, Collaborator, allows penetration testers to observe external resource interactions in their targets, especially …

Read Story

Amazon and other cloud providers have made it child’s play to spin up ephemeral server instances for quick deployment of various services. If you want a web server to host your …

Read Story

In the first part of our series, we looked at how to modify an iOS application binary by inserting load commands to inject custom dynamic libraries. In Part 2, we …

Read Story

Sometimes, walls get in the way, and when that happens, we need a door. A door needs a proper lock, or a security vulnerability may result. Server-side request forgery (SSRF) …

Read Story

You’re a professional. You’re equipped with the latest in elite, customized RFID hacking tools. So, it's high time you put a silencer on your Tastic RFID Thief – the weaponized, …

Read Story

Are you plagued by Google bot detection? Are your SearchDiggity scans almost immediately pausing, promising you that they’ll be “Auto-resuming in 15 minutes.”? Do you want to avoid the frustration …

Read Story

Random number generation has been insecure for decades and there hasn’t been a practical pen testing tool to tackle this problem – until now, that is. Enter Untwister Untwister is …

Read Story

Subscribe by Email