Navigating Complex Systems: A Small Conversation with a Skilled Penetration Tester
I recently had a chance to catch up over coffee with my colleague who is quite skilled in penetration testing.
How to preserve backslashes when using sed command
Today I faced an interesting task. I wanted to generate a bunch of yaml files with different names to test
Tar general arguments
Can't remember how to create or extract an archive? This short article can help you to refresh your
Running a container with Nmap in Kubernetes/OpenShift
Have you ever faced a situation when you need to check which ports are open in the pod with your
Sniffing traffic on a pod in Kubernetes/OpenShift
It's such a pain when you have a container without root permissions and you can't install
A bit of Knowledge Management
“Capture, reuse and improve” principle, how to improve knowledge management in your team and how to avoid possible problems
Test cases: decide what to automate in 4 steps
I think every tester faces a situation when he gets a new feature, then he
identifies test cases (or test
Base64 basics and “bse64” CTF challenge writeup
Last year I took part in a RedHat internal CTF challenge run by Keith Swagler and the Red Hat Information
Pull Request in progress: checklist for reviewer
Your teammate asks you to review his Pull Request. But what should you check to
not miss anything? Here is