The Tutorial Framework: Containerizing IT Security Knowledge

The Tutorial Framework: Containerizing IT Security Knowledge

The Tutorial Framework: Containerizing IT Security Knowledge Written by Kristof Toth  November 29, 2019 How can we make security education a whole lot more accessible and fun? The tutorial framework is the answer. In this article we dive into how to create...
Learn about CSP-based XSS protection

Learn about CSP-based XSS protection

Learn about CSP-based XSS protection Written by Ákos Hajba  July 28, 2018 The security model of web is rooted in the same-origin policy. Each origin is isolated from the rest of the web and codes should only have access to their origin’s data. Because of this...
Learn about CSP-based XSS protection

Three major XSS issues in 2016 (plus an avatao XMaSS challenge)

Three major XSS issues in 2016 (plus an avatao XMaSS challenge) Written by Gábor Pék  December 20, 2016 In our previous blog, we gave you a small introduction to Cross-site Scripting (XSS) attacks and added some easy challenges to get a taste of web security....
Parse your binaries with Kaitai WebIDE

Parse your binaries with Kaitai WebIDE

Parse your binaries with Kaitai WebIDE Written by Gábor Pék  November 29, 2016 Binary analysis starts with the understanding of different file formats. Fortunately, there are several tools (e.g., CFF explorer, FileAlyzer) which help you to understand their...
avataoTools introduces popular security tools

avataoTools introduces popular security tools

avataoTools introduces popular security tools Written by Gábor Pék  October 25, 2016 One of the most difficult parts in IT security is to get started. There are zillions of interesting topics all around, but if you are completely new in this area you can...
Parse your binaries with Kaitai WebIDE

Reverse engineering tutorial and challenge

Reverse engineering tutorial and challenge Written by Gábor Pék  September 6, 2016 So here we are again with your next avatao Tuesday challenge. Today, we are delving a bit into reverse engineering by providing a small tutorial and a challenge to solve. A...