Samuel K. Addison

Blog

In this blog post, I'll share my experience integrating containers into my project and the security measures I implemented to protect my workflow.

Python Under the Hood

Python, the versatile programming language, has a lot going on beneath the surface. As a developer, you may have encountered or may have thought about question like "What happens under the hood when you write and run Python code?". In this blog, we'll take a closer look at Python's inner workings to demystify some of the magic.

.NET Security Considerations

When it comes to developing software applications, security should always be a top priority. In the case of .NET development, it is no different. .NET offers a robust development platform, and within it, the C# programming language plays a significant role. However, it's essential to recognize that C# development in the .NET ecosystem also requires careful attention to security considerations. In my recent exploration of .NET development, I have come to appreciate the importance of incorporating strong security measures into .NET applications. In this blog, we will explore some of the most important security considerations that developers should keep in mind when working with .NET.

Recently, I completed a course on the Human Element in Information Security, and it opened my eyes to the importance of individual responsibility when it comes to keeping ourselves secure in the digital world. While organizational policies and procedures are crucial, it is equally important for individuals to take steps to protect their own information. In today's technology-driven world, people of all ages need to be aware of the potential risks and how to reduce them. This blog post aims to shed light on the significance of protecting individuals and their data security, with a particular focus on the use of social media platforms.

Malicious Document Analysis

Malicious documents are a common vector for malware attacks. They can be disguised as harmless files, such as Microsoft Office documents or PDFs, and can contain hidden scripts or macros that execute when opened. Analyzing malicious documents is an important part of cybersecurity, as it can help identify and prevent potential threats. In this blog post, we'll explore some tips and tools for static analysis of malicious documents.

How to fix _JAVA_OPTIONS issue

Are you encountering the "java.lang.UnsupportedClassVersionError" error when trying to run Burp Suite or any other application on your machine? In this blog post, we will discuss how to update Java on Kali Linux to fix the "UnsupportedClassVersionError" error.

Linux Privilege Escalation Lab

In this lab the goal is to get root access to the target machine 192.168.1.211 and retrieve the flag (string of random characters) stored in the root user home folder.

Server Side Request Forgery

Server-Side Request Forgery (SSRF) is a type of web application vulnerability that allows an attacker to make unauthorized requests from a web server. This can result in sensitive data being exposed, or even complete compromise of the affected system. In this blog post, we will explore how SSRF attacks work and provide some sample payloads to help you test your applications for this vulnerability.

XML External Entity (XXE) Attack is a type of security vulnerability that can allow attackers to steal sensitive information or execute arbitrary code. It is a relatively old attack technique, but it is still relevant today, as it can be found in many modern web applications. In this article, we will explore what XXE attacks are, how they work, and how to prevent them.

Exploiting Sudo

Exploiting the sudo command is a common tactic used by attackers to gain privileged access to a system. Sudo, which stands for "superuser do," allows authorized users to execute commands as another user, typically as the root user. This feature can be incredibly powerful, but it can also be dangerous if not used properly. In this blog post, we will discuss some of the ways sudo can be exploited and the best security practices to avoid these types of attacks.

Why Use Semantic HTML in Web Development?

Semantic HTML refers to the use of HTML elements that convey meaning beyond just the visual presentation of the content. Using Semantic HTML can have a significant impact on the accessibility, maintainability, and search engine optimization (SEO) of your website. In this blog post, we will explore why web developers need to use Semantic HTML in web development, and provide some best practices and sources for implementing it.