Indu Jawlacoders.hashnode.dev·Oct 14, 2024Types of Ethical Hacking: Choose yoursWeb Application Hacking: SQL InjectionSQL Injection is one of the most common web application vulnerabilities, where an attacker can manipulate the backend database by injecting malicious SQL queries through user input fields. Consider a scenario whe...Discuss#wirelesshacking
Indu Jawlacoders.hashnode.dev·Oct 14, 2024Networking for Ethical Hacking: A Beginner’s GuideIn today’s interconnected world, networking is the backbone of how computers communicate and exchange information. Whether it’s sending an email or streaming a video, networking fundamentals are the foundation that makes it possible. This article cov...Discusssubnet masks
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Oct 2, 2024The Power of Wordlists: Why Every Ethical Hacker Needs OneWordlists are a core component of brute-force attacks. Let's learn what they are and how to use them. Imagine that you’re a security professional who’s performing a penetration test on a client’s website. Your job is to find potential weak points in ...DiscussSecurity
Muskantrendingflow.hashnode.dev·Sep 25, 2024How Data Science is Disrupting Supply Chain ManagementIn business environment, supply chain management (SCM) is undergoing a significant transformation, driven by the rise of data science. Traditional methods of managing supply chains, which relied heavily on manual processes and intuition, are rapidly ...DiscussData Science
Cyberousblog.cyberous.in·Sep 20, 2024Top 10 Cybersecurity Threats Every Business Should Be Aware OfIn today's digital landscape, businesses face an ever-growing array of cybersecurity threats. From phishing schemes to ransomware attacks, these dangers can cause significant financial and reputational damage. Understanding these threats is the first...Discusscyberous
Muskantrendingflow.hashnode.dev·Sep 13, 2024The Importance of Ethical Considerations in Data AnalyticsIn the contemporary landscape of data analytics, ethical considerations have become increasingly crucial. As organizations harness vast amounts of data to drive business decisions, the ethical dimensions of data collection, analysis, and usage must b...Discussethicalhacking
Harsh TandelforBreachForcebreachforce.net·Sep 11, 2024Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and MitigationCryptocurrency exchanges are frequent targets for hackers due to the high value of the digital assets they hold. Understanding common security vulnerabilities, knowing how to test them as an ethical hacker, and applying effective mitigation strategie...Discusscrypto exchange hacks
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Sep 10, 2024Shodan – What to Know About the Internet’s Most Dangerous Search EngineShodan is a search engine that discovers devices connected to the internet. In this article, we’ll look at why it’s both a valuable tool and a potential threat. When you hear the term “search engine,” your mind likely jumps to Google, Bing, or Yahoo....Discusshacking
MindMeld7mindmeld7.hashnode.dev·Aug 23, 2024Writeup Inj3ct0rs from DockerlabsLet's start our reconnaissance with a quick nmap scan: nmap -p- --open -sV -sC --min-rate=5000 -n -Pn 172.17.0.2 -oN Nmap1 -p- - Search for ports --open - List open ports -sC - Use a set of reconnaissance scripts -sV - Find the version of the open s...Discuss·32 readsDockerLabs
Subhanshu Mohan Guptablogs.subhanshumg.com·Aug 20, 2024AI-Powered Ethical Hacking: Automating Penetration Testing in DevSecOpsIntroduction As cyber threats evolve in complexity, the need for robust security practices has never been more critical. Traditional penetration testing, while effective, is often time-consuming and requires skilled professionals. Enter AI-powered au...Discuss·40 likes·48 readsAI powered DevOpsDevSecOps