Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 28, 2023How Can an Attacker Execute Malware Through a Script?Executing malware through a script is a common attack vector used by cybercriminals to infect devices and systems. Scripts provide an easy way to distribute and activate malicious code without direct user interaction. Understanding how script-based m...DiscussCyber Securityattacker
prakashhackreveal.hashnode.dev·Nov 3, 2023What is a Hacker? Types, Skills Every Thing You Need to KnowA hacker is a person who enjoys working with technology or computer systems. Hackers love to explore and learn how computer systems work, to improve what they do or to make them do something they weren’t supposed to do. Hacking can occur for a variet...Discuss2Articles1Week
Rabindra Man Bajracharyarabindramb.hashnode.dev·Oct 7, 2023Hidden Backdoor in Digicom Router?In this article, let us take a close look into the Digicom router DG-M342T. First, let us view the technical specifications of the router. It's a 2.4 GHz router with 1 WAN Port and 4 LAN Port. Nothing fancy, but it's a decent router for use as a seco...Discuss·39 readsrouter
Tanmay Dhobaletanmay4l.hashnode.dev·Sep 24, 2023Unveiling the Truth: The Dark Web is Not as Scary as it SoundsIntroduction: Discover the reality behind the Dark Web and how it is often misunderstood. Despite its eerie reputation, the Dark Web shares similarities with the regular internet, leading to misconceptions and the spread of misinformation. Exploring ...Discuss·10 likeshacker
Hacktushacktus.hashnode.dev·Sep 18, 2023OAuth Misconfiguration Leading to Unauthorized Admin Access For All Org ProductsTL;DR ? I signed up using any unclaimed email on application_2 (e.g., victim@example.com) due to no email verification, then logged into the victim's account on application_1 using the SSO feature that allowed me to log in using application_2. Introd...Discuss·10 likes·1.3K readspenetration testing
ConradWilliamforOpen Source Community Kampalablog.oscakampala.org·Aug 7, 2023Unveiling Kenya's Cyber Siege: Anonymous Sudan's Blitzkrieg on Kenya's Digital FrontiersIntroduction: The recent infrastructural attack on Kenya orchestrated by the hacker group Anonymous Sudan has raised significant concerns about the vulnerability of critical systems in the digital age. In this comprehensive blog, we explore the motiv...Discuss·1 like·53 reads#cybersecurity
Unathi Okhuedailyprogrammer.hashnode.dev·Jun 8, 2023🚀 From 0 to Hacker👋 Hello aspiring cybersecurity professionals! Are you prepared to go off on an exhilarating trip into the fascinating realm of cybersecurity and hacking? 🌐🔐 In this blog post, we're plunging into the world of cybersecurity from the inside out to u...Discuss#cybersecurity
Kristof RiebbelsProdotnet.kriebbels.me·Mar 19, 2023The Hidden Dangers of JSONPreviously on... I will take a brief pause from my series on securing and reclaiming control of personal data. To give a little spoiler, it is about using the tool SimpleLogin | Open source anonymous email service. In previous posts, I mentioned that...Discuss·1 like·306 readsSecurityjson
Stackzerostackzero.hashnode.dev·Feb 18, 2023Introduction to SSRF Exploitation: A Practical Tutorial for Ethical HackersThis article was originally published at https://stackzero.net/ssrf-introduction/ Server-side request forgery (SSRF) is a type of web application vulnerability that allows an attacker to send a crafted request from a vulnerable web application to an ...Discuss·50 readshacking
Ferdi birgülferdibirgul.hashnode.dev·Jan 21, 2023Wireshark Network Analysis ToolWireshark, açık kaynak kodlu bir ağ protokol analiz aracıdır. Bu aracı kullanarak, bir ağda geçen trafiği görüntüleyebilir, filtreleyebilir ve analiz edebilirsiniz. Wireshark, ağ güvenliği, ağ yönetimi ve ağ sorunlarının çözümü gibi birçok alanda kul...Discuss·27 reads#cybersecurity