Parthparthh.hashnode.dev·Jul 22, 2024ParrotCTF Backdrop: Detailed WalkthroughThis room focuses on leveraging several misconfigurations and gaining initial access using the CMS dashboard. While it requires some research, it is a relatively straightforward machine.Access the machine here Let's dive in! Enumeration: Let's run ...Discuss·1 like·37 reads#cybersecurity
MindMeld7mindmeld7.hashnode.dev·Jul 20, 2024Writeup HiddenCat from DockerlabsYou have two options: READ or WATCH me on YouTube how I complete this CTF Machine. Do not press the Subscribe Button, It's ILLEGAL 😁😆😅😂🤣 https://www.youtube.com/watch?v=7ZK1Y0aV7oE Let's start our reconnaissance with a quick nmap scan: nmap -...DiscussCTF
prasanna darkb0ts.hashnode.dev·Jul 16, 2024Hunting Bugs with GAU and HTTPX: A Step-by-Step GuideBug bounty hunting is a thrilling field where security enthusiasts and professionals test their skills against live systems, seeking vulnerabilities that can be reported for rewards. In this guide, we'll explore how to use two powerful tools, GAU (Ge...Discussbug bounty
MindMeld7mindmeld7.hashnode.dev·Jul 15, 2024Writeup Wallet from DockerlabsYou have two options: READ or WATCH me on YouTube how I complete this CTF Machine. Do not press the Subscribe Button, It's ILLEGAL 😁😆😅😂🤣 https://www.youtube.com/watch?v=2Uy5qgHVZko Let's start our reconnaissance with a quick nmap scan: nmap -...Discuss·27 readsCTF
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...Discussjpfdevs cybersec
Augustine Uchechiauchdigitaltech.hashnode.dev·Jul 13, 2024Automating Trust Wallet App with Appium and PythonPlease note that this script is for educational purposes only and should not be used for illegal activities. It is the responsibility of the user to ensure that they are using this script in a legal and ethical manner. Also, please note that this scr...Discuss·1 likeProgramming Blogs
Collins Boitl00pinfinity.hashnode.dev·Jul 11, 2024Building an Ethical Hacking Playground at HomeI recently embarked on an exciting project: building my own homelab to dive deeper into ethical hacking. I am able to practice freely without the worry of breaking any rules in this environment. Let me show you how I set it up on my computer. Why Bui...Discussethicalhacking
Blessing Mufaro Kashavathecyberstash.hashnode.dev·Jul 10, 2024PNPT Certification ReviewForeword While many articles discuss TCM Academy’s PNPT certification, I felt compelled to write my own review. Exceptional work deserves continuous praise and acknowledgment. This concise review aims to share my personal sentiments about the certifi...Discuss·26 readsCybersecurity Insightinfosec
Ankush nidhiankushh.hashnode.dev·Jul 9, 2024Exploiting Http(80) Metasploitable from kali Linux walkthroughI hope you're already setup your lab installing Metasploitable and kali Linux on Vmware or any sandbox environment. If not you will not be able to perform this. Lets get started... Before exploiting what we do first? yes, you guessed right!! its port...Discussmetasploit
theblxckcicadablog.blxckcicada.co.za·Jul 9, 2024Active Directory Enumeration with MastertulBefore you continue with this blog post, I want to clarify that this content is for educational and ethical purposes only. Do not use these methods on a network you are not authorized to access. Active Directory(AD) enumeration is like exploring a Wi...Discuss#enumeration