Mounssif BOUHLAOUInuux.hashnode.dev·Dec 14, 202410 Ways to Copy Files from Server to Local: A DevOps GuideOkay, let's dive deep into the world of transferring files from a remote server to your local machine. As a DevOps engineer, this is a task you'll encounter frequently, and mastering various methods is crucial for efficiency and security. This articl...2 likesDevops
Chidinma Ozoemenachidinmawrites.hashnode.dev·Oct 4, 2024Securing Your Digital Fortress: Understanding and Protecting Network ComponentsVirtual Network (VNet) A Virtual Network (VNet) is a logically isolated network within a cloud environment, like Azure or AWS. It allows you to securely connect and manage your resources, such as virtual machines (VMs), within the cloud1. VNets can b...firewall
MindMeld7mindmeld7.hashnode.dev·Aug 23, 2024Writeup Inj3ct0rs from DockerlabsLet's start our reconnaissance with a quick nmap scan: nmap -p- --open -sV -sC --min-rate=5000 -n -Pn 172.17.0.2 -oN Nmap1 -p- - Search for ports --open - List open ports -sC - Use a set of reconnaissance scripts -sV - Find the version of the open s...49 readsDockerLabs
Vishwam Patelhoneypot.hashnode.dev·Aug 13, 2024Honeypots Explained: A Comprehensive OverviewIntroduction Definition of a honeypot: A honeypot is a security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Purpose and significance The purpose and significance of a honeypot ...whiteevil
sansquarestarlog.sansquare.in·Aug 3, 2024The Rising Threat of Cyberwarfare: A New Era of ConflictCyberwarfare has emerged as a significant and evolving threat in the 21st century, with nation-states, hacktivist groups, and criminal organizations increasingly leveraging cyberattacks as a potent weapon. These attacks can disrupt critical infrastru...Tech InsightsSecurity
Ananya Chatterjeedevelover.hashnode.dev·Jul 30, 2024My bug bounty methodology and how I approach a targetHow I choose a bug bounty program , let’s assume you have received some private invitations. How would you choose between them? What program would you pick to start hunting for bugs? On HackerOne where I primarily hunt for bugs, I choose a program ba...1 like·103 readsBug Bounty#cybersecurity
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...jpfdevs cybersec
Ferdi birgülferdibirgul.hashnode.dev·Apr 25, 2024Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Ferdi BirgülLearn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black ...1 like·29 readsredteaming
Sergio Medeirosgrumpz.net·Apr 22, 2024Uncovering an SSRF Vulnerability in PDFMyURL Affecting Numerous UsersWhile enumerating the scope of a target on a private bug bounty program, I came across a subdomain used for generating PDF files. However, it seemed out-of-scope as they were simply white labeling a service called PDFMyURL, which lets you convert any...11 likes·1.4K readsMy Security Researchbugbounty
Ferdi birgülferdibirgul.hashnode.dev·Mar 9, 2024Blue Team Level 1 NotesCommon Ports PortServiceDescription 20,21FTPFile Transfer Protocol used to transfer files b/w systems. 22SSHSecure Shell Protocol allows users to securely connect to a remote host. 23TelnetUsed before SSH, allows users to connect to a remote...10 likes·73 readsferdibirgül