Системной подход к сдаче OSWE в 2025

Offensive Security Web Expert ( OSWE ) – продвинутая сертификация offsec по безопасности WEB приложений. Причем ключевым отличием от менее известного Offensive Security Web Assessor ( OSWA ) является упор на анализ исходного кода приложения, то есть поиск уязвимостей в формате «белого» ящика. Окончательное решение сдавать этот экз я принял на бизнес съезде в Турции, когда познакомился с предпринимателем, который проходил ironman (ссылка) дважды. Мой поздний достигатель сразу загорелся идеей о стремительной подготовке. Однако товарищ председатель кооператива задал мне закономерный вопрос: «А OSWE сдать ты не хочешь?». 9 апреля 2025 года, в своём телеграм-канале PathSecure я опубликовал новость о приобретении курса :)

https://habr.com/ru/articles/1024100/

#pentest #offsec #oswe #web #security #education

Системной подход к сдаче OSWE в 2025

Введение Offensive Security Web Expert ( OSWE ) – продвинутая сертификация offsec по безопасности WEB приложений. Причем ключевым отличием от менее известного Offensive Security Web Assessor ( OSWA )...

Хабр
Open security and OffSec projects - Negative PID

Security research is one of the areas where open source has had the deepest and most complex impact. Tools built openly are used to defend critical

Negative PID

🎯 Passed the OSCP+!  

After a lot of late nights, practice labs, and more failed shells than I'd like to admit — I finally have the cert in hand.

Some words for the family: Thank you — the late nights would have been much harder without your patience and understanding.

On to the next one. 🔐 🤐 🙈

#OSCP #OffSec

Inside the tools of Anonymous - Negative PID

In the mythology of Anonymous, operations often looked spontaneous — a flash-mob of code striking from nowhere, vanishing just as quickly. But behind that

Negative PID
Open security and OffSec projects - Negative PID

Security research is one of the areas where open source has had the deepest and most complex impact. Tools built openly are used to defend critical

Negative PID
How to become a bug bounty hunter - Negative PID

Many people entering the cybersecurity field believe that the only way to demonstrate their skills to a prospective employer is to hack into their systems.

Negative PID
Inside the tools of Anonymous - Negative PID

In the mythology of Anonymous, operations often looked spontaneous — a flash-mob of code striking from nowhere, vanishing just as quickly. But behind that

Negative PID
Breaking into offensive security - Negative PID

Offensive security roles attract people who enjoy thinking creatively, solving puzzles, and understanding systems from the inside out. Whether you want to

Negative PID
OAuth account takeover doesn't need leaked tokens. No state param = CSRF to forced account linking. Loose redirect_uri matching = code theft via open redirect chains. Implicit flow puts tokens in browser history and Referer headers. PKCE bypass when not enforced server-side. SSRF via OpenID dynamic client registration. Six patterns, all with labs. https://www.kayssel.com/newsletter/issue-43/ #OAuth #BugBounty #Pentesting #websecurity #Offsec #InfoSec
OAuth 2.0: Six Ways the Authorization Flow Breaks

Missing state CSRF, redirect_uri hijacking, open redirect code theft, implicit flow token leakage, PKCE bypass, and SSRF via OpenID dynamic client registration

Kayssel
Breaking into offensive security - Negative PID

Offensive security roles attract people who enjoy thinking creatively, solving puzzles, and understanding systems from the inside out. Whether you want to

Negative PID