How To Achieve Dynamic Redirect URIs [OAuth2]
Demonstrating how to overcome the whitelist restriction for redirect URIs in the OAuth2 protocol. This method involves using an intermediary URL propagator and re-purposing the OAuth2 `state` parameter.Read More...
Differences Between Intermediate And Enterprise Code
Here I discuss the design and style differences between an individual's intermediate code and a skilled team's enterprise code. I'll also suggest strategies that can be used to ensure developed projects are high quality.Read More...
Web Security Basics - Cookies & Authenticated Sessions
Here we discuss the basics regarding how websites store a user session and keep you logged in - with a focus on ensuring security.Read More...
WiFi Network Tracking - Imitating Google's Geolocation Network (Part 2)
Having recorded WiFi network geolocation information, I'll now be writing software to filter and manipulate that data. This will allow us to locate WiFi networks using just their SSID or BSSID.Read More...
WiFi Network Tracking - Imitating Google's Geolocation Network (Part 1)
Breaking down Google's international geolocation network and building a proof of concept from the ground up using intermediate WiFi knowledge and programming skills - explaining design decisions made along the way.Read More...