Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 17, 2024Protecting Your Systems: A Guide to XML External Entity AttacksWhat is XML External Entity (XXE)? Before diving into XXE attacks, let’s first understand XML (Extensible Markup Language). XML is a markup language that structures and stores data in a format readable by both humans and machines. Originally develope...DiscussFortify and Defend: Navigating the Cybersecurity Landscapexml external entity
ANURAG SISODIYAtechwithanurag.hashnode.dev·Oct 8, 2024How to Protect Your Codebase from SQL Injection AttacksIntroduction SQL injection is one of the most common and dangerous vulnerabilities in web applications. It occurs when attackers can manipulate SQL queries through user input, potentially gaining unauthorized access to your database or even executing...DiscussSQL
Akbar Khanakbarkhan.hashnode.dev·Sep 25, 2024Extracting NTLM Hashes with Mimikatz: A Step-by-Step Approach.Mimikatz is a powerful post-exploitation tool used by penetration testers, security researchers, and cyber attackers to interact with the Windows security model. Developed by Benjamin Delpy, it's widely known for its ability to extract plaintext pass...Discuss·1 like·153 readsmimikatz
TATHAGATA ROYthreatradar.vercel.app·Sep 6, 2024HTB Noxious Walkthrough: LLMNR Poisoning & Network ForensicsIntroduction to HTB Noxious In this HTB lab, I dive into a real-world network forensics scenario involving an Active Directory network. The setup focuses on identifying and mitigating an LLMNR (Link-Local Multicast Name Resolution) poisoning attack, ...DiscussSecurity
Akash Reddy Jammulaakashrj.hashnode.dev·Aug 31, 2024Understanding Buffer Overflow Attacks: A Deep DiveImagine you're filling a glass with water. Normally, you'd stop pouring when the glass is full. But what if you kept pouring? The water would spill over the edges, creating a mess. In the world of cybersecurity, a similar concept exists—it's called a...DiscussWeb Development
Haseeb Yousufblogs.haseebs.tech·Aug 30, 2024Safeguarding Web Applications: The Essential Role of Rate LimitingIn the ever-evolving landscape of web development, protecting applications from abuse and overload is paramount. Rate Limiting emerges as a critical technique in this defense, offering a robust solution to control incoming request rates and maintain ...Discuss·28 readsddos
Navya Srivastavanavya01.hashnode.dev·Aug 19, 2024Is Blockchain Truly Safe? A Deep Dive into Attacks, Consensus, and Mitigation StrategiesBlockchain technology has emerged as a cornerstone of the digital revolution, promising transparency, immutability, and decentralization. While these attributes contribute to a robust security framework, it is essential to recognize that no system is...DiscussBlockchain
Syed Rabeetsyedrabeet.hashnode.dev·Aug 17, 2024Understanding Denial of Service (DoS) in Smart ContractsI embark on my journey to become a smart contract auditor with Cyfrin Updraft,I have learned about various attack vectors, with Denial of Service (DoS) being my favorite. Imagine being an attacker who completely disrupts a protocol's functionality—wh...Discuss·66 readsBlockchain
Temitopetemmysoft.hashnode.dev·Aug 2, 2024What is a Distributed Denial-of-Service (DDoS) Attack?Basic Idea: A DDoS attack is like a digital traffic jam. Imagine you're trying to get into a popular concert, but thousands of people who have no intention of seeing the show are blocking the entrance. You and other real fans can't get in because the...DiscussCloud Computing
Magda Jankowskamagdajankowska.hashnode.dev·Jun 25, 2024Phishing and Social Engineering Attackssmart contracts An overview and walkthrough of how phishing and social engineering attacks can be conducted using smart contracts, along with examples to illustrate the concepts. Overview Phishing and social engineering are types of cyberattacks that...DiscussBlockchain