Azeez Halimatleemahcloud.hashnode.dev·Dec 4, 2023Automate Malicious traffic detection in cloud using Amazon guard duty AIIntroduction The design of this system plays a pivotal role in the successful realization of any complex computing project. In the context of this project, which focuses on the crucial task of malicious traffic detection in a cloud environment, the s...Discussmalicous traffic
Arcturusarcturus.hashnode.dev·Dec 3, 2023TryHackMe | Advent of Cyber 2023 | Day 3Day 3 : Brute-forcing Hydra is Coming to Town Greetings! This is Day 3 of Advent of Cyber 2023 by TryHackMe, and we continue our exploration of this December month, learning new things and increasing our knowledge base. Today, we need to recover t...Discuss#cybersecurity
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Use Hashcat in Kali LinuxHashcat is an advanced password-cracking tool that can help ethical hackers and security researchers recover lost or forgotten passwords by cracking password hashes. Kali Linux has hashcat pre-installed, making it easy to get started with password cr...Discusshashcat
Akash Devcoolcoderr.hashnode.dev·Sep 6, 2023Brute Force Algorithms: The Power of Exhaustive SearchHey there, readers! 👋 This is the second article in my blog series, where we'll explore problems that can be solved using brute-force algorithms. In the previous article, I introduced this algorithm. If you haven't read it yet, please go check it ou...DiscussAlgorithms for Everyone: A Beginner’s Guide to Algorithm Design Techniquesbruteforcing
Alex Galhardoalexgalhardo.com·Aug 8, 2023Creating a Brute Force Attack Script to Find Secret Codehttps://youtu.be/JX0BNbhsHIQ Introduction It is quite common for systems to use 6-digit secret codes to authenticate users. Delivery is usually via email or SMS For example 435 657 Algorithm In this algorithm, using parallelism, the algorithm...Discuss·26 readsbruteforcing
Leokhaaleoo.hashnode.dev·Jul 21, 2023Security Risk - Timing Attack - Challenging but Entirely FeasibleTiming Attack is one of the techniques that hackers exploit by leveraging server-side computations to adjust attack payloads accordingly. In this article, I will present the most common example of this type of attack and discuss prevention methods us...Discuss·65 readsgolang
Stackzerostackzero.hashnode.dev·Jul 11, 2023How to Easily Create a zip password cracker in Just Seconds!If you’ve ever forgotten a password for a zip file, you know how frustrating it can be.There’s no need to worry anymore because in this article we’ll show you how to crack a zip password using a dictionary attack.Usually, zip files are protected with...Discuss·29 readsPython
LoneD3VILunr-c1.eu.org·May 23, 2023How-to Brute-Force FTP Creds & Get Server AccessHackers frequently discover fascinating files in the unlikeliest of locations, FTP servers being one of them. If you're lucky, anonymous logins might occasionally be permitted, allowing anyone to sign in. But you'll almost always need a legitimate us...Discusshacking
LoneD3VILunr-c1.eu.org·May 19, 2023Create Custom Wordlists for Password Cracking Using the MentalistThe restrictions of default wordlists like RockYou based on stolen passwords frequently let down beginners learning brute-forcing attacks against WPA handshakes. By creating personalized wordlists, we can increase our efficiency beyond simply using t...Discuss·56 readscracking
Mihnea Octavian Manolachemihnea.hashnode.dev·Aug 2, 2022wpLockPicker: Brute Forcing WordPress with JavaScriptWhen it comes to pentesting or hacking in general, Python leads the way as one of the most popular programming languages. However, in recent years, JavaScript became very popular not just for its front-end strengths, but also for back-end. So, even t...Discuss·1 like·725 readspentesting