Grace Edwingracedwin.com·Sep 23, 2023Embarking on the Cybersecurity Journey: My BeginningsOne fundamental truth stands out in the catch of cybersecurity: a thorough understanding of computer networks is the foundation of proficiency. As I embarked on this thrilling journey, the importance of unraveling the complex structure of networks be...Discuss·10 likes·42 reads#cybersecurity
Jonathan CilleyProjonathancilley.hashnode.dev·Aug 21, 2023Adventures in Running a Honeypot HiveLately, I have been working on one of the more fun hobby projects that I have decided to attempt. Since I spend a lot of my day thinking about and managing information security processes and tools, I thought going through the exercise of setting up m...Discuss·43 readsHoneypot
Damasukma Trihanandiblog.dama.zip·Aug 11, 2023Bash Reverse ShellKemarin saya gabut dan mencoba mengoprek htb, dan berhasil mendapatkan flag salah satu retired machine di HTB yaitu Squashed, tentu saja dengan melihat write up orang. Salah satu teknik menarik yang digunakan adalah Rerverse Shell ini. Apa itu Revers...Discuss·1 likepentesting
Boris Tougmaboris-cyber.hashnode.dev·Aug 4, 2023Try Hack Me : SimpleCTFIntroduction Welcome to the "Simple CTF" write-up, a good challenge for beginners! In this CTF, we'll explore different services such as FTP, SSH and Apache to find security holes and gain access privileges. Nmap scan We start by running a Nmap scan ...Discuss#cybersecurity
Boris Tougmaboris-cyber.hashnode.dev·Aug 2, 2023Try Hack Me : RooMeHello, I'm going to show you the "RootMe" CTF write-up on the Try Hack Me platform. It's an easy CTF, perfect for warming up and testing your cybersecurity skills. Recon First of all, we start with a Nmap scan to identify active services on the targe...Discusstryhackme
Ransom Olukotuncyber-ransom.hashnode.dev·Jul 31, 2023Improving Information Security with Two-Factor AuthenticationIntroduction: Cyberattacks and data breaches have become increasingly common, with hackers constantly developing new techniques to steal sensitive information. Organizations of all sizes need robust cybersecurity measures in place to protect themselv...Discuss·10 likes#cybersecurity
Green Methodgreenmethod.hashnode.dev·Jul 28, 2023What Is Cloud Penetration Testing? A Complete GuideThe prominence of cloud computing in IT has been an undeniable trend over the past decade, and all indications point to its continued growth in the foreseeable future. Most online services today operate on a cloud-native model driven by operational c...Discuss#cybersecurity
Olamide Olabodeolasquare.hashnode.dev·Jul 25, 2023Cybersecurity Vs Information Security: Similarities and DifferencesIntroduction Hello there, curious minds! Let's take a quick dive into the fascinating world of Cybersecurity and Information Security to explore the similarities and differences between these two crucial domains. The terms Cybersecurity and Informat...Discuss·1 like·52 reads#cybersecurity
Samir Ranjan Parhils-lrt.com·Jul 22, 2023Understanding Server-Side Request Forgery (SSRF)Introduction: In today's interconnected world, web applications rely on various external services to provide dynamic content and functionality. However, this dependence on external resources can also create security vulnerabilities, one of which is S...Discuss·79 readsssrf
Shreya Shreeshreyashree.hashnode.dev·Sep 8, 2023Hacking into Thrills: My Digital Defenders CTF 2023 ExperienceHave you ever wondered what it takes to navigate the intricate world of cybersecurity and emerge as a digital defender? Well, I had the incredible opportunity to embark on such a journey through the Digital Defenders Program 2023, a cybersecurity eve...DiscussCyberSec