williamma.hashnode.devHow Phishing Attacks Exploit Subdomains to Deceive UsersHow Subdomains Are Used in Phishing Attacks Phishing is one of the most common cyber threats — and attackers are constantly finding new ways to make their scams look legitimate. One sneaky tactic they use is abusing subdomains to trick users into tru...Jun 9, 2025·2 min read
williamma.hashnode.devPhishing - Still One of the Most Effective and Underrated CyberattacksPhishing is a type of cyberattack where an attacker tries to trick you into revealing sensitive information—like passwords, credit card numbers, or login credentials—by pretending to be a trustworthy entity, such as a bank, a service provider, or eve...Jun 8, 2025·2 min read
willsec.hashnode.devThe CIA TriadThe CIA triad describes three principles involved in protecting data. Confidentiality Integrity Availability Confidentiality Confidentiality ensures only authorized individuals or systems can access the data. A few ways we can achieve confidenti...Dec 5, 2024·2 min read
willsec.hashnode.devHTB Notes: ArchetypeSMB Scanning the machine we find the following services running: SMB (445) SQL Server (1433) We can list the shares or services by using the following command. smbclient -L //10.129.227.227 --user=Administator This works because the SMB server is...Sep 6, 2024·3 min read
willsec.hashnode.devHTB Notes: FunnelFTP We begin by scanning the box with nmap. We find two ports open on the machine: 21 (ftp) and 22 (ssh) We can access the ftp server using the anonymous user account. An interesting note is we could use either the anonymous or ftp user and we co...Sep 6, 2024·3 min read