Fahri ShihabMicroservices: From 0 to OK 👌In this write up, lets start by designing an e-commerce application and gradually re-designing them as microservices as well as how to…Aug 31Aug 31
Fahri ShihabCSRF: The Fake Door to Your Sensitive DataThis is a continuation of my previous story on CORS Misconfiguration: The Hidden Door to Your Sensitive Data and I will try to use the same…Aug 24Aug 24
Fahri ShihabCORS Misconfiguration: The Hidden Door to Your Sensitive DataAnalogy: Imagine you have a special guest list for your house party, allowing only certain friends to enter. If you accidentally leave the…Aug 21Aug 21
Fahri ShihabTLS Certificate handshake and provisioningThe SSL handshake process begins with the client initiating communication by sending a ClientHello message, which includes the maximum…Aug 18Aug 18
Fahri ShihabMy Notes on Kubernetes v1This is dedicated for people, like me, who have a hard time understanding the kubernetes components 🤓Jul 21Jul 21
Fahri ShihabUniversal Windows Shellcode — part 1Writing a universal shellcode exploit for Windows Operating SystemsDec 28, 2020Dec 28, 2020
Fahri ShihabBypassing Windows DEP (Data Execution Prevention) Using ROP (Return Oriented Programming)Another perspective in bypassing AlwaysOn DEPSep 26, 2020Sep 26, 2020
Fahri ShihabBypassing Windows DEP (Data Execution Prevention)Bypassing DEP on Windows XP Service Pack 2Sep 18, 2020Sep 18, 2020
Fahri ShihabMS08–067 Exploit DevelopmentA Guide to writing an exploit for the famous MS08–067 vulnerabilitySep 13, 2020Sep 13, 2020