Page title Page location
Nagarro Security Blog
Blog post: Sec in your DevOps: Adding the OWASP Dependency Check to your Jenkins pipeline
Blog post: DACL Permissions Overwrite Vulnerability in Check Point VPN
Blog post: Privilege Escalation vulnerability in CrashPlan
Blog post: Creating a DOCX/Python Polyglot
Blog post: Does your computer respect your rights? Part 1
Blog post: A Fundamental Tool in the Toolkit: Evasive Shellcode Launchers – Part 1
Blog post: Find The CEO’s Email — in a cloud world
Blog post: Interactive guide to Buffer Overflow exploitation
Blog post: Interactive Beginner's Guide to ROP
Blog post: LM, NTLM, Net-NTLMv2, oh my!
Blog post: Panama Papers: Hackingen av Mossack Fonseca – hva bør vi bli minnet om når det gjelder sikkerhet?
Blog post: SMB Named Pipe Pivoting in Meterpreter
Blog post: What Makes a Great Penetration Tester
Penetration Testing Case Study
Nagarro Security Home
Privacy Policy
Standards-based security current state assessment