© 2023 Hashnode
#cybersecurity
Let's discover this 2x2 WiFi 6E USB adapter with Kali 2023.1, and perform some quick testing. While WiFi 6 and WiFi 6E adapters have been available for a while, USB adapters only started becoming avai…
The Open Web Application Security Project (OWASP) is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks t…
Precisely. Solidity allows developers to create fallback functions that are invoked when a contract receives a transaction that is not handled by any existing functions. For instance, let's say Contra…
Metasploit is a popular open-source framework widely used in ethical hacking and penetration testing. It provides a powerful platform for identifying computer system vulnerabilities and testing networ…
The OSI model is a conceptual framework that describes the communication process between two devices in a network. The model is divided into seven layers, each responsible for a specific aspect of net…
GCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, t…
Along with updates to our Kali container, we added Wireless Exploitation Framework (WEF), WiFite2, and a couple more. We have created the following containers: finchsec/wef: Wireless Exploitation Fra…
This blog includes a step-by-step guide to installing and starting a raspberry pi. We will see how to assemble a raspberry pi kit, connect various cables and install raspberry pi OS. 🙏🏻 I received t…
We should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access…
Our Discord server got a makeover. We now have more than 200 feeds coming from Twitter, GitHub, GitLabs, and other places. Categories While the Discussion and Company categories are unchanged, the oth…