Anukam chidaluclemas.hashnode.dev·Dec 20, 2024Click with Caution: A Beginner’s Guide to Cybersecurity“CTU’s been breached. A worm’s erasing files faster than we can back them up.” You might have heard lines like this in movies and shows like 24, Westworld, Scorpion, and Mr. Robot. Growing up, I enjoyed watching sci-fi and tech shows. Cybercrime sho...#cybersecurity
Jonas Satkauskascybr.hashnode.dev·Dec 20, 2024Today I've learned: Changing Shell Prompt Name/PATH importance (Environment variables)Prompts in Kali Usually terminal in Kali looks like this (username@hostname)-[current_directory] # When you work as a root you see: (root@kali)-[current_directory] # Environment variable which is used to change the prompt There’s a PS1 Environment ...10 likescybr
FIKARA BILALblog.fikara.io·Dec 17, 2024Subdomain EnumerationSubdomain research allows the identification of subdomains linked to a main domain that could be vulnerable, thus serving as entry points for misconfigured services. Discovering subdomains helps gather information about the technologies and configura...subdomain discovery
FIKARA BILALblog.fikara.io·Dec 13, 2024Information Gathering in Bug BountyIn the context of Bug Bounty or security testing, information gathering is a step that involves collecting as much data as possible about a target. The goal is to better understand its environment and, above all, identify potential vulnerabilities. T...bugbountytips
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Basic Port Scans - NMAPNmap Basic Port Scans INTRODUCTION The next step would be checking which ports are open and listening and which ports are closed. Therefore, in this room and the next one, we focus on port scanning and the different types of port scans used by nmap. ...Network Mapper - NMAPnmap
FIKARA BILALblog.fikara.io·Dec 10, 2024BugBountyCollecte d’informations Dans un contexte de BugBounty ou de test de sécurité, la collecte d’informations est une étape qui consiste à recueillir un maximun de données sur une cible. Le but est de mieux comprendre son environnement et surtout identifi...bugbounty
FIKARA BILALblog.fikara.io·Dec 6, 2024ScanningLe scan d’un réseau ou d’une application permet d’identifier des vulnérabilités sur les services ou des applications qui s’exécutent. C’est une étape assez cruciale qui permet de détecter des failles de sécurité potentielles. Plusieurs outils de scan...#cybersecurity
FIKARA BILALblog.fikara.io·Nov 26, 2024Recherche de sous-domainesLa recherche de sous-domaines permet d’identifier les sous-domaines rattachés à un domaine principal qui pourraient être vulnérables, et donc des points d’entrée pour des services mal configurés. Le fait de découvrir les sous-domaines permet donc rec...42 readssubdomain discovery
Ahmed Razaahmedrazadev.hashnode.dev·Nov 25, 2024The Importance of Systems Like Cloudflare in Web DevelopmentIn the world of web development, the role of infrastructure and performance optimization cannot be overstated. As websites grow in complexity and scale, developers face increasing challenges in ensuring their sites remain fast, secure, and highly ava...cloudflare
Ahmed Razaahmedrazadev.hashnode.dev·Nov 24, 2024Understanding Cyber Attacks: Threats, Impacts, and Notable IncidentsIn today’s hyper-connected world, where information is exchanged at an unprecedented scale and speed, the threat of cyber attacks has become a critical issue for individuals, businesses, and governments alike. A cyber attack refers to any deliberate ...#cybersecurity