Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Installing ClamAV on CentOS 7

Referenced from Linux-Audit: To get ClamAV on CentOS installed, we have to use the EPEL repository (Extra Packages for Enterprise Linux). Fortunately, the Fedora project provides this with an easy installation. Unfortunately the default configuration is not properly working. In this post we collect some of the issues and required changes. Let’s start with installing […]

Burp to Brute Force a Login Page

Using Burp to Brute Force a Login Page Authentication lies at the heart of an application’s protection against unauthorized access. If an attacker is able to break an application’s authentication function then they may be able to own the entire application. The following tutorial demonstrates a technique to bypass authentication using a simulated login page […]

Installing ClamAV on CentOS 7

Referenced from Linux-Audit: To get ClamAV on CentOS installed, we have to use the EPEL repository (Extra Packages for Enterprise Linux). Fortunately, the Fedora project provides this with an easy installation. Unfortunately the default configuration is not properly working. In this post we collect some of the issues and required changes. Let’s start with installing […]

Burp to Brute Force a Login Page

Using Burp to Brute Force a Login Page Authentication lies at the heart of an application’s protection against unauthorized access. If an attacker is able to break an application’s authentication function then they may be able to own the entire application. The following tutorial demonstrates a technique to bypass authentication using a simulated login page […]