Raicode.flatmarstheory.com·May 30, 2024Mastering Pointers in CIn the ever-evolving landscape of software development, where artificial intelligence (AI) and supercomputers are pushing the boundaries of what's possible, the importance of secure and robust programming practices cannot be overstated. One foundatio...DiscussC
Raicode.flatmarstheory.com·May 30, 2024Mastering Memory Management in CIn the realm of modern computing, where artificial intelligence (AI) and supercomputers are pushing the boundaries of what's possible, the importance of secure and efficient programming practices cannot be overstated. One foundational aspect that und...Discussbuffer overflows
Blake JacobsforDorki - Blogdorki.hashnode.dev·May 28, 2024How I Discovered a Critical Path Traversal Vulnerability Using DorkiIn this article, I detail my journey of discovering a critical vulnerability using Secondary Context Path Traversal. By leveraging Dorki for passive reconnaissance, I identified an Apache Tomcat-hosted web app and exploited its path normalization fla...Discuss·413 readshacking
Blessing Mufaro Kashavathecyberstash.hashnode.dev·May 25, 2024openECSC 2024 - CTF WriteupGeneral Remarks CTF Page Link: https://open.ecsc2024.it/ openECSC has mostly medium to difficult challenges as it is designed to scout the best participants to battle in the grand finals in Italy, and ultimately at the International Cybersecurity Cha...DiscussCTF WriteupsCTF Writeup
Q8 { Empowering Changeq08.org·May 19, 2024Redefining the Relationship Between Privacy, Security, and Personal Autonomy1. Introduction In an increasingly digital world, the concepts of privacy, security, and personal autonomy have become central to discussions about individual rights and societal norms. These three pillars, while distinct, are deeply interconnected. ...Discuss·1 likeprivacy
Muhammad Ahmed Mohsinahmedmohsin.hashnode.dev·May 5, 2024The Rise of Reconfigurable Intelligent SurfacesIntroduction: In 6G communications, Reliable Low-Latency Communication (URLLC) is crucial, but it faces challenges like signal blockage and fading due to obstructions and environmental factors. This leads to signal degradation, affecting reliability....Discussb5g
Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·12 likes·357 readsMy Security Researchhacking
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Apr 28, 2024A Comprehensive Guide to Learning Smart Contract Security: From Scratch to AdvancedIntroduction Welcome to your journey into the world of smart contract security! This guide will take you through all the necessary steps to understand and master the art of building secure decentralized applications (dApps). We will explore various r...DiscussSmart Contracts
Christopher Akintoyechristopher-akintoye.hashnode.dev·Apr 6, 2024A Comprehensive Guide to Cybersecurity for Remote WorkersIntroduction The nature of work has changed significantly in recent years, with remote work becoming a more common and frequently chosen kind of employment. Remote work arrangements have transformed the way individuals and organizations function by p...Discuss·4 likes#cybersecurity
Jiyajiyajha.hashnode.dev·Mar 26, 2024Unlocking Secrets: The Intriguing World of Encryption Software and its Impact on Data SecurityData sent and received over the internet can be kept private and secure with encryption. Passwords, credit card details, conversations with coworkers, or even just sending family photos to friends and family might all fall under this category. Encryp...Discuss#encryptedcommunications