Mongoaudit – An Audit and Pentesting Tool for MongoDB Databases

Databases typically store sensitive data or data that is important for the company. Mongoaudit helps to audit several technical aspects of running a MongoDB instance and get it properly secured. Usage and Audience Mongoaudit is commonly used for Application security or Database security.  Target users for this tool are pentesters, security professionals, and system administrators. […]

January 17, 2023
Read More >>

Learning Series: Docker Escape Method

What is Docker Escape Method? Firstly, we are required to understand the importance of Docker escape or also containers escape which was infrastructure that is used by virtual or day-to-day operations for all enterprises. The case of cybersecurity incidents is been risen nowadays, especially the docker escape which we will be able to learn on […]

The post Learning Series: Docker Escape Method appeared first on Threatninja.net.

January 7, 2023
Read More >>

Learning Series: XML External Entity Injection Attack

What is XML external entity injection? XML external entity injection is a security vulnerability that normally allows a bad guy by executing the XML data of the application’s processing. A bad guy will able to view files on the application server filesystem which the bad guy can escalate an XML attack to compromise the vulnerable […]

The post Learning Series: XML External Entity Injection Attack appeared first on Threatninja.net.

January 7, 2023
Read More >>