Got any questions?

We do our best to respond as quickly as possible

Aptive Secuirty Research Blog

The latest tech news.

  1. LLMNR / NBT-NS Spoofing Attack Explained

    LLMNR / NBT-NS Spoofing Attack Explained

    LLMNR / NBT-NS spoofing attack: how to use LLMNR & NetBIOS poisoning to capture credentials from the network using Kali + Responder.py and how to fix LLMNR & NBT-NS (NetBIOS) spoofing / poisoning attacks.

  2. Local File Inclusion (LFI)

    Local File Inclusion (LFI)

    Local File Inclusion (LFI) explained with examples, and learn how to perform security testing for LFI vulnerabilities. The intent of this document is to assist with web app security assessments engagements by consolidating research for LFI testing techniques. LFI vulnerabilities are typically discovered during application assessments or penetration testing using the techniques contained within this document.

  3. Does SameSite Provide Sufficient CSRF Defence?

    Does SameSite Provide Sufficient CSRF Defence?

    An overview on what the SameSite cookie attribute is, and if it provides sufficient protection against CSRF on it's own without other mitigations.

  4. SSL & TLS HTTPS Testing Guide

    SSL & TLS HTTPS Testing Guide

    The definitive guide for SSL / TLS security testing by Aptive. This article documents the process of using semi automated tools to perform SSL & TLS security assessments and how to validate the tool findings using manual testing methods. The aim is to optimise the TLS & SSL security testing process when performing pen testing to optimise the time spent on TLS security testing.

  5. Unrestricted File Upload Testing & Bypass Techniques

    Unrestricted File Upload Testing & Bypass Techniques

    What is Unrestricted File Upload Testing and how to test for Unrestricted File Upload Vulnerabilities including filter bypass techniques for Windows, Linux, Apache and IIS.

  6. What is Cross-site Scripting (XSS)? XSS Explained

    What is Cross-site Scripting (XSS)? XSS Explained

    An overview of what SQL Injection is, understand the attack, and the potential risk to your organisation.

Get on board

Subscribe to our newsletter

Explore our comprehensive investment management solutions, carefully crafted to help you grow your wealth.