Skip to content

Rogue Security

Looking under the hood

  • Home
  • About Me

Category: Pentest

  • Home
  • Pentest

Methodology for Secure Code Review

February 20, 2021February 20, 2021 roguesecurity2 Comments on Methodology for Secure Code Review

Introduction Manual Source code review is one of the most essential skills for any penetration tester to have. This is one […]

General, Pentest application security, code review

Attacking and Defending Kubernetes Cluster

March 11, 2020March 22, 2020 roguesecurityLeave a Comment on Attacking and Defending Kubernetes Cluster

Kubernetes is becoming the de-facto standard for managing and orchestrating the containers. Its power of managing and deploying cloud-native application […]

containers, kubernetes, Pentest container, kubernetes, pentest, security

Recent Posts

  • Methodology for Secure Code Review
  • Attacking and Defending Kubernetes Cluster
  • Docker 101 for busy pentesters
  • Docker commands cheatsheet
  • Abusing Nashorn for Remote Code Execution

Archives

  • February 2021
  • March 2020
  • February 2020
  • July 2019
  • December 2018
  • April 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • July 2017
  • May 2017

Categories

  • Attacks
  • Buffer Overflow
  • containers
  • CTF
  • General
  • kubernetes
  • Pentest
  • Reverse Engineering
  • Uncategorized

Subscribe



Copyright © 2022 Rogue Security Theme: Flash by ThemeGrill. Proudly powered by WordPress