Abhinandan Khuranablog.s3curity.ninja·Jul 13, 2024Creating a Nessus weekly scan automation for updated IPs every weekHello, tech enthusiasts! The inspiration for this task was to automate the annoying weekly Network Scan for my company every Sunday on all the public facing IPs (that are changed every week), so that we already know about known vulnerabilities and mi...Discuss·10 likes·27 readsnessus
Tatiane Pimenta Lealtatianepimentaleal.hashnode.dev·Jun 25, 2024ISC2 CC Exam: My Experience and Good Study Resources I UsedI asked a friend to mentor me regarding some decisions I had to make in my career, as he finished his Master’s degree and is about to start his doctorate. We started with the basics: my résumé. After reading it and talking to me, he told me something...DiscussISC2 Certification
matz rochaghost-unknown0x13.hashnode.dev·Jun 16, 2024Linux para Todos: Informações e Dicas EssenciaisPara iniciarmos nossa jornada com o conteúdo técnico, começaremos com um tema que é de extrema importância, seja você um profissional de Segurança ou de qualquer área relacionada a T.I. Para falarmos desse sistema tão utilizado em diversas áreas da t...DiscussBase Fundamental - Inicio da jornada em Offensive SecurityLinux
Polkam Srinidhinidhiblog.hashnode.dev·May 16, 2024Module 2: Types of Malware & Cyber LandspaceSpyware Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking detail...DiscussMalware
Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·12 likes·430 readsMy Security Researchhacking
FIKARA BILALbilaldotcom.hashnode.dev·Apr 15, 2024The gaining access phaseIntroduction The Gaining Access phase in penetration testing represents a pivotal point where ethical hackers try to penetrate a target system's defenses. This article will explore the complexities of this phase, examining the techniques, tools, and ...Discuss#cybersecurity
REHAN ALIdignitas.hashnode.dev·Apr 6, 2024CodifyIP: 10.10.11.239 Starting with the nmap scan nmap -sC -sV -o nmap 10.10.11.239 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-03 05:33 EDT Nmap scan report for 10.10.11.239 Host is up (0.20s latency). Not shown: 997 closed tcp ports (conn-ref...Discuss·26 readshacking
Prajoti Raneprajotirane.hashnode.dev·Apr 6, 2024Target Data Breach: A Case Study in Cybersecurity Failures and Lessons LearnedIn the annals of cybersecurity breaches, few incidents have had the lasting impact and repercussions as the Target data breach of 2013. This watershed moment not only exposed the vulnerabilities of one of America's largest retailers but also served a...DiscussTarget data breach, cybersecurity failures, cyber attack timeline, technical details of breach, breach mitigation strategies, security measures, lessons learned from breach
Yarelys Riveracyberyara.com·Apr 5, 2024Safeguard Your Code: 6 Basic Vulnerabilities to Avoid and Tips to Improve Your Code SecurityIn the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnera...Discusscode security
Prajoti Raneprajotirane.hashnode.dev·Apr 3, 2024Dissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's CoreDissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's Core Introduction: The Estonia DDoS (Distributed Denial of Service) attack of 2007 stands as a pivotal moment in the chronicles of cyber conflict, marking a significant ...Discuss·30 readsddos attacks