Magda Jankowskamagdajankowska.hashnode.dev·Jun 25, 2024Phishing and Social Engineering Attackssmart contracts An overview and walkthrough of how phishing and social engineering attacks can be conducted using smart contracts, along with examples to illustrate the concepts. Overview Phishing and social engineering are types of cyberattacks that...DiscussBlockchain
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jun 20, 2024OSCP Journey : TJ_Null - HTB/SearchI - Introduction : Gaining the initial foothold for this box was a bit challenging, but once the process began, it became incredibly engaging. This box is an excellent example of a comprehensive Active Directory challenge and is a must-try. It covers...Discuss#cybersecurity
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jun 8, 2024OSCP Journey : SMB Relay AttackI - Introduction : In today's post, we will build upon our previous discussion on LLMNR Poisoning. This time, we will delve into SMB Relay attacks. Unlike the process of cracking hashes, an SMB Relay attack allows us to leverage captured credentials ...Discuss·1 like#cybersecurity
Prajoti Raneprajotirane.hashnode.dev·Apr 3, 2024Dissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's CoreDissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's Core Introduction: The Estonia DDoS (Distributed Denial of Service) attack of 2007 stands as a pivotal moment in the chronicles of cyber conflict, marking a significant ...Discuss·30 readsddos attacks
Gaurav Chaudharypixelgig.pro·Mar 24, 2024Alert! GitHub Repositories Under Attack: How to Protect Your CodeThis week, the Wild West of code witnessed a digital dust-up! Over 100,000 repositories on GitHub, the popular code-sharing platform, were reportedly infected with malicious code. This incident serves as a stark reminder for all programmers to stay v...DiscussGitHub
Amanhekshot.hashnode.dev·Jan 19, 2024Unraveling the Anatomy of CSRF Attacks: Exploring the Trifecta of VulnerabilitiesIn the ever-evolving landscape of cybersecurity threats, Cross-Site Request Forgery (CSRF) stands out as a formidable adversary. This insidious attack vector takes advantage of three critical conditions to infiltrate web applications and compromise u...Discuss·1 likecsrf
Derek Onwudiwetecheffect.hashnode.dev·Sep 28, 2023Resist Social Engineering AttacksSocial engineering attacks are manipulative tactics used by hackers to deceive individuals or organizations into divulging sensitive information, performing actions, or compromising security. Here are common tactics and tips to recognize and resist t...Discusssocial media
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Learn How to Perform a Sandwich AttackIn this tutorial, we will be using Scaffold-ETH x BuildBear to interactively showcase how to Perform a Sandwich Attack on UniSwapV2 on a fork of the Ethereum Mainnet. What is Sandwich Attack? In a sandwich attack scenario, the attacker monitors the m...Discussdefi
Derek Onwudiwetecheffect.hashnode.dev·Sep 7, 2023Traffic Light HackingWe frequently see movie scenarios when hackers are able to breach systems for the management of traffic lights, with devastating repercussions. This is a tested security research. Introduction Traffic lights are a critical component of urban infrastr...Discusstraffic
Derek Onwudiwetecheffect.hashnode.dev·Aug 22, 2023Spoofing Detection TechniquesSpoofing is a cyber attack where a malicious actor pretends to be someone or something else to gain unauthorized access or deceive a user. Detecting and preventing spoofing attacks involves using techniques like: Authentication Mechanisms: Implement ...DiscussArp spoofing