Menu

Close
  • Home
  • Resources
  • Linux Commands
Subscribe
Menu

Information Security Consultant | Pen tester

Thoughts, tutorials and other musings related to Information Security, Pentesting skills and life in general.

Scroll Down
Page 1 of 6 Older Posts →

Reverse Engineering - Understanding Code Obfuscation

This post reflects my interest in malware analysis techniques - it should be considered a "work in progress" rather than a full blown tutorial or walkthrough, »

Chris Young Chris Young on Reverse Engineering, Malware Analysis 08 March 2021

OWASP Newcastle Webinar - 5th May 2020

Earlier this year I did an internal presentation to my colleagues at Pentest Ltd on the topic of Malware Analysis and Intelligence Recon. The presentation was »

Chris Young Chris Young on OWASP, Malware Analysis, Threat Intelligence, URLHaus 07 May 2020

File Upload to Remote Code Execution

In this post, I will walk you through a real life example of how I was able to compromise a web application and achieve remote code »

Chris Young Chris Young on web app testing, walkthrough, reverse-shell, RCE 14 April 2020

Bugbounty Tips - Zseano Live Mentoring Series - XSS

Over the weekend I participated in @zseanos live stream bug bounty mentoring session in which he created an application for viewers to hack live and submit »

Chris Young Chris Young on web app testing, Bug Bounty, XSS, zseano 01 July 2019

Reflected XSS on driver.grab.com

Thought I would do a quick write up of a small bug that I found late last year (2018). Unfortunately, the bug was considered out of »

Chris Young Chris Young on web app testing, enumeration techniques, Bug Bounty 20 June 2019

A Beginners guide to Pen Test Reporting

With a few exceptions, the majority of books I have read about pen testing treat reporting as an after thought, with a few pages roughly detailing »

Chris Young Chris Young on pentesting, reporting, guide 01 March 2019
Page 1 of 6 Older Posts →
Information Security Consultant | Pen tester © 2021
Proudly published with Ghost