Skip to content

Blog

FC Attacking Modern Web Applications

Attacking Modern Web Applications

In the realm of contemporary of Modern web applications, the prevalent architectural framework of choice often takes the form of microservices architecture. In this context, what appears to be a unified front-end application is essentially an amalgamation of numerous small, distinct micro-services on the back end, interconnected through a reverse proxy mechanism. Consider, for instance,… Read More »Attacking Modern Web Applications

Burp Intruder alert

Mastering Burp Intruder Attack Modes: A Comprehensive Guide for Web Security Professionals

Burp Intruder is a powerful tool included in the Burp Suite, a widely-used web vulnerability scanner and penetration testing tool. It allows security professionals to automate various types of attacks against a web application. One of its most essential features is the ability to perform attacks in different modes, each tailored for specific purposes. In… Read More »Mastering Burp Intruder Attack Modes: A Comprehensive Guide for Web Security Professionals

CVE October 2023

Critical CVEs And Active Threats For The Period 23rd-26th, October 2023

This week from October 23 to October 26, Firecompass research identified a significantly high number of CVEs that are High in severity and can be attributed to ransomware, botnets, and other threat actors groups which are creating significant impact. In this blog, we will share the important CVEs discovered this week as well as a… Read More »Critical CVEs And Active Threats For The Period 23rd-26th, October 2023

SSTI to RCE Blog

Cybersecurity Puzzle: From Server-Side Template Injection (SSTI) to Remote Code Execution (RCE)

In the ever-evolving landscape of cybersecurity, vulnerabilities continue to emerge, putting critical systems and sensitive data at risk. One such threat that has gained notoriety in recent years is the Server-Side Template Injection (SSTI) vulnerability. While SSTI on its own is a concerning issue, what makes it even more perilous is its potential to escalate… Read More »Cybersecurity Puzzle: From Server-Side Template Injection (SSTI) to Remote Code Execution (RCE)