Anjanesh Lekshminarayanananjanesh.dev·May 4, 2024Using token in vanilla PHP for CSRFFrameworks like Django and Laravel have CSRF Protection by default. Most of use it by their default behaviour in our jinja2 / blade templates and it just works. Super easy to make use of it and we need to write 0 code to implement the security bit on...Discuss·67 readscsrf
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Nov 20, 2023Attacking Against DevOps EnvironmentSCM AUTHENTICATION Commands: 1. git clone 2. git log Example Commands: GitRob: - Command: gitrob <organization/repo> - Example: gitrob acme-corp/website - GitLeaks: - Command: gitleaks --repo-path <path-to-repo> - Example: gitleaks --repo-path ~/pro...Discuss·1.9K readsDevops
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Most Common Vulnerabilities In Solidity: In-Depth Part 2This article will guide you through some of the most common vulnerabilities in Solidity, including Flashloan, overflow and underflow, tx.origin, Insecure Randomness, and Improper Input Validation Attacks. If you haven’t already, please check out Part...DiscussSolidity
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Most Common Vulnerabilities In Solidity: In-Depth Part 1This article will walk you through some of the most common vulnerabilities in Solidity, such as Reentrancy, Incorrect Calculations, Oracle Failure/Manipulation, Weak Access Control, and Frontrunning Attacks. Not only that, but we’ll guide you on the ...DiscussSolidity
Quantum Cyber Solutionsqcs.hashnode.dev·Aug 2, 2023Protect Your Website from XSS Attacks 🔒Published on Wednesday, August 2, 2023 Protect Your Website from XSS Attacks 🔒 ============================================ Authors Name Elon Tusk 😄 Twitter What are XSS Attacks? 💻 Cross-site scripting (XSS) is a type of security vulnerability...Discussattacks
RFSforAD Attacksblog.ad-attacks.com·May 13, 2023Understanding Kerberoasting: A Simple GuideKerberoasting is a technique used by ethical hackers and security experts to evaluate network security. It exploits weak service account configurations to extract service tickets or credentials used by certain system services, enabling a form of priv...DiscussKerberosActive Directory
Quantum Cyber Solutionsqcs.hashnode.dev·Apr 24, 2023Protect Your Website from XSS Attacks 🔒Published on Monday, April 24, 2023 Protect Your Website from XSS Attacks 🔒 ============================================ Authors Name Eric deQuevedo 😄 Twitter What are XSS Attacks? 💻 Cross-site scripting (XSS) is a type of security vulnerabili...Discussattacks
PopLab AgencyforOffensive Wirelessoffensive-wireless.hashnode.dev·Mar 21, 2023Top 5 Wi-Fi AttacksSecure your network and keep your data safe with the top 5 Wi-Fi attacks. Uncover the most common Wi-Fi security risks, including man-in-the-middle and denial-of-service attacks, and learn how to protect your network and data from these types of atta...DiscussWifi Penetration Testingattacks
Sanchit Khuranageniuslearner.hashnode.dev·Jan 20, 2023Understanding the Different Types of Cyber Attacks and How They Can Affect Your IdentityIn today's digital age, cyber attacks are becoming increasingly common and sophisticated. These attacks can have serious consequences for your identity and personal information, leading to financial loss, identity theft, and other forms of cybercrime...Discuss·29 readsIdentity