Hacking OAuth2.0
By Red Siege | March 22, 2021
The intent of this blog is to help penetration testers and security researchers get a deeper understanding of the OAuth protocol. We are going to learn how to bypass authentication […]
Learn MoreNetworking Fundamentals Part I
By Red Siege | February 10, 2021
This blog is the first of three in a series to go over some basic networking fundamentals that every security professional should know. These blogs are geared towards the absolute […]
Learn MoreSiegeCast : Web Api Weaknesses
By Justin Connors | January 11, 2021
Learn More