NwkDDLnekwokdoodle.com·Apr 22, 2024Palo Alto to Cisco Site-to-Site IPSec VPN: Connecting Branch LANsDo you want to connect your branch LANs through an IPSec VPN tunnel using Palo Alto Next-Generation Firewall and Cisco Router? You are now currently in the right place! Today I am going to show you a way to do it. Before moving to the tutorial, I rec...Discussipsec-lan-to-lan
Damien BurksProdamienjburks.com·Apr 19, 2024Kickstarting Your DevSecOps Career - The 4 Essential Certifications You NeedIntroduction In this blog post, I'll be unpacking the four certifications that I firmly believe are pivotal for anyone aspiring to launch a career in DevSecOps. Drawing from my journey, research, and insights gathered along the way, this post aims to...Discuss·14 likes·34 readsBeginner Developers
FIKARA BILALbilaldotcom.hashnode.dev·Apr 15, 2024The gaining access phaseIntroduction The Gaining Access phase in penetration testing represents a pivotal point where ethical hackers try to penetrate a target system's defenses. This article will explore the complexities of this phase, examining the techniques, tools, and ...Discuss#cybersecurity
Avishai Poorunavishaicloudspace.hashnode.dev·Apr 14, 2024From Coding Hobbyist to Cybersecurity Expert: Tracing My PathIn an increasingly digital world, the significance of cybersecurity is paramount. It's not only about safeguarding data but also about protecting the core of our connected society. My venture into the realm of cybersecurity has been exciting and fulf...Discusscybersecurity
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 11, 2024Muddled Libra Threat Group Targets SaaS and Cloud Platforms for Data Discovery and Exfiltration, Write-up Shared on XThreat Analysis On April 9, 2024, a report from Palo Alto Networks’ Unit 42, @Unit42_Intel on Twitter, revealed updated tactics, techniques, and procedures (TTPs) used by Muddled Libra, a group driven by financial gains. During the period from late 2...DiscussMuddled Libra
Jeremiah Liscummrliscum.com·Apr 10, 2024Subdomain Reconnaissance Made EasyThe information gathering phase of penetration testing is probably the most important part. This is where we build our understanding of the target, and get a general idea of how we may wish to attack. Subdomain reconnaissance is a critical skill to h...Discuss·38 readsWeb Development
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 10, 2024JiaTansSSHAgent: Replicating XZ Utils Backdoor for Enhanced SSH Access and Security BypassThreat Analysis On April 9, 2024, GitHub user blasty, known as @bl4sty on X (previously Twitter), released JiaTansSSHAgent, an SSH agent tool that mimics some functions of the XZ Utils backdoor. This backdoor arose from the insertion of malicious cod...Discuss·36 readsGitHub
Brilian Firdausbrilianfird.hashnode.dev·Apr 10, 2024Introduction to JWT (Also JWS, JWE, JWA, JWK)The security and privacy of users' data have been a growing concern for the past few years. At the same time, JWT, as one technology to combat it, has been used more and more. Understanding JWT will give you an edge over the other software engineers....DiscussCryptography
Stephen Odogwustevepurpose.hashnode.dev·Apr 8, 2024Network PerformanceI have been exploring computer networking for a while now, all in a bid to make me a more rounded programmer. One topic that has fascinated me is Network Performance. When we talk about performance in software, it's basically always about looking for...Discussnetworking
REHAN ALIdignitas.hashnode.dev·Apr 6, 2024CodifyIP: 10.10.11.239 Starting with the nmap scan nmap -sC -sV -o nmap 10.10.11.239 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-03 05:33 EDT Nmap scan report for 10.10.11.239 Host is up (0.20s latency). Not shown: 997 closed tcp ports (conn-ref...Discusshacking