Varkey Thomasskinnyidiot.hashnode.dev·Jul 19, 2024Brute-forcing and EnumerationIntro: Enumeration is a process in cybersecurity through which detailed information can be gathered about a target. Username enumeration is essentially the process of discovering valid usernames within a system or a network. The information can be ga...Discuss#enumeration
Md Nadim Anwarnadim.in·Jul 14, 2024Data Structures for Beginners: Essential Concepts SimplifiedWhat is Data Structure? A data structure is a way of organizing data so that it can be used effectively and efficiently. From a code design perspective, we need to pay particular attention to the way data is structured. If data isn’t stored properly,...DiscussData Structures and Algorithms (DSA)#nadim.in
Ass of Arabiakittenium.hashnode.dev·Apr 5, 2024SMTP Cracking and Credential Stuffing using PythonGreer Whitley - 04/05/2024 Introduction In this article, we will explore the process of SMTP (Simple Mail Transfer Protocol) cracking and credential stuffing using Python. While these topics are often associated with malicious activities, it is esse...Discusssmtp
Azeez Halimatleemahcloud.hashnode.dev·Dec 4, 2023Automate Malicious traffic detection in cloud using Amazon guard duty AIIntroduction The design of this system plays a pivotal role in the successful realization of any complex computing project. In the context of this project, which focuses on the crucial task of malicious traffic detection in a cloud environment, the s...Discussmalicous traffic
Arcturusarcturus.hashnode.dev·Dec 3, 2023TryHackMe | Advent of Cyber 2023 | Day 3Day 3 : Brute-forcing Hydra is Coming to Town Greetings! This is Day 3 of Advent of Cyber 2023 by TryHackMe, and we continue our exploration of this December month, learning new things and increasing our knowledge base. Today, we need to recover t...Discuss·29 reads#cybersecurity
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Use Hashcat in Kali LinuxHashcat is an advanced password-cracking tool that can help ethical hackers and security researchers recover lost or forgotten passwords by cracking password hashes. Kali Linux has hashcat pre-installed, making it easy to get started with password cr...Discuss·2.4K readshashcat
Akash Devakashdevblog.hashnode.dev·Sep 6, 2023Brute Force Algorithms: The Power of Exhaustive SearchHey there, readers! 👋 This is the second article in my blog series, where we'll explore problems that can be solved using brute-force algorithms. In the previous article, I introduced this algorithm. If you haven't read it yet, please go check it ou...Discuss·28 readsAlgorithms for Everyone: A Beginner’s Guide to Algorithm Design Techniquesbruteforcing
Leokhaaleoo.hashnode.dev·Jul 21, 2023Security Risk - Timing Attack - Challenging but Entirely FeasibleTiming Attack is one of the techniques that hackers exploit by leveraging server-side computations to adjust attack payloads accordingly. In this article, I will present the most common example of this type of attack and discuss prevention methods us...Discuss·67 readsgolang
Stackzerostackzero.hashnode.dev·Jul 11, 2023How to Easily Create a zip password cracker in Just Seconds!If you’ve ever forgotten a password for a zip file, you know how frustrating it can be.There’s no need to worry anymore because in this article we’ll show you how to crack a zip password using a dictionary attack.Usually, zip files are protected with...DiscussPython
LoneD3VILunr-c1.eu.org·May 23, 2023How-to Brute-Force FTP Creds & Get Server AccessHackers frequently discover fascinating files in the unlikeliest of locations, FTP servers being one of them. If you're lucky, anonymous logins might occasionally be permitted, allowing anyone to sign in. But you'll almost always need a legitimate us...Discuss·38 readshacking