TagsHTTPHow to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!Author(s)Razvan IonescuPublished at20 Feb 2020Updated at09 Jun 2023Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at18 Jul 2023
How to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!Author(s)Razvan IonescuPublished at20 Feb 2020Updated at09 Jun 2023
Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at18 Jul 2023