microbytesecurity.hashnode.devHacking Exposed: Exploiting a Classic Buffer Overflow for HedgeHogsUnderstanding binary exploitation is one of the most important foundations in penetration testing. Classic buffer overflow vulnerabilities shaped the history of computing, and although modern systems now use stronger defenses like DEP and ASLR, these...Dec 17, 2025·7 min read
microbytesecurity.hashnode.devIntro To AWS For PentestersUnlock the secrets of AWS Pentesting! Discover how understanding AWS enumeration is crucial for both attackers and defenders. This post guides you to learn the fundamentals of aws for pentesters in 3 mins. Cloud Security 101 The cloud has revolutioni...Nov 29, 2025·4 min read
microbytesecurity.hashnode.devTurboCharge Your Nmap Scan: Five Hacks 🧿🔍Overview: This post will explore five Nmap hacks and tips that security researchers and ethical hackers can use to optimize their scans, enhancing workflow and automation. Understanding Nmap Default Scan To grasp Nmap's scan timing, let's start with ...Jul 24, 2024·3 min read