© 2023 Hashnode
#exploit
source :- https://tutorialboy24.blogspot.com/2022/09/exploiting-amazon-simple-notification.html Introduction Countless applications rely on Amazon Web Services’ Simple Notification Service for applica…
When it comes to hacking databases, sometimes we have to dig very deep to find a vulnerability, but other times the information is there for anyone to grab. The following article exposes a simple (yet…
There is a popular (and incredible) geographical game called Geoguessr, where players guess locations from Google Maps Street View imagery. I play it regularly, and I am sure many of you have seen tho…
In this article we will create a simple exploit with Python. NOTE: Since the entire code snippet is not that long, no final code will be provided on GitLab this time. Foreword This article is STRICTL…
What is XML-RPC? XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism WordPress utilizes this XML-RPC that is used to exchange information between computer systems over a net…
This is the write-up for the PWN101 room on TryHackMe, created by Jopraveen. You can find the room (Difficulty: Medium) will all the challenges here. To develop the exploits in this document, I used P…
Learn Windows Hacking by creating a custom tool with python. INTRODUCTION Hi everyone! Do you know how easy it is to hack a windows machine? Well, it turns out that the hacker only needs to create some simple scripts in any language and it …
What Does Rootkit Mean? Rootkits are a type of malware that is designed so that it can remain hidden on your computer. They can contain some tools, ranging from programs that allow hackers to steal …
What Does "Spam" Mean? "What is Spam? | Definition & Spam Varieties." Computer spam, text spam, and phone spam constitute spam, undesired, unsolicited digital communication transmitted in volume. Spam…
What Is an Access Token? An access token is a tiny piece of code that contains a large amount of data. Information about the user, permissions, groups, and timeframes is embedded within one token. It…