Sumaiya Akter Riacybersecurity-beginners.hashnode.dev·Jan 7, 2025Who Are Hackers? Key Facts You Should KnowA hacker is someone who uses technical skills to access systems, networks, or data, often without authorization. Hackers can be classified into: Black Hat: Engage in illegal activities. White Hat: Ethical hackers who help secure systems. Grey Hat:...hacker
Santhoshprogrammerzero.hashnode.dev·Dec 26, 2024BellaCiao Just Got an Upgrade: Meet BellaCPP, the Smarter, Stealthier Threat!BellaCiao! Nahh, not the song! It’s about Charming Kitten’s (again, not a real KITTEN!!) AKA APT35 or SandStorm’s malware. Yes, you heard it right, a malware named BellaCiao! So what’s special about this malware? What sets it apart from every other c...1 like·35 readsbellaciao
Mounssif BOUHLAOUInuux.hashnode.dev·Dec 14, 202410 Ways to Copy Files from Server to Local: A DevOps GuideOkay, let's dive deep into the world of transferring files from a remote server to your local machine. As a DevOps engineer, this is a task you'll encounter frequently, and mastering various methods is crucial for efficiency and security. This articl...2 likes·30 readsDevops
Chidinma Ozoemenachidinmawrites.hashnode.dev·Oct 4, 2024Securing Your Digital Fortress: Understanding and Protecting Network ComponentsVirtual Network (VNet) A Virtual Network (VNet) is a logically isolated network within a cloud environment, like Azure or AWS. It allows you to securely connect and manage your resources, such as virtual machines (VMs), within the cloud1. VNets can b...firewall
MindMeld7mindmeld7.hashnode.dev·Aug 23, 2024Writeup Inj3ct0rs from DockerlabsLet's start our reconnaissance with a quick nmap scan: nmap -p- --open -sV -sC --min-rate=5000 -n -Pn 172.17.0.2 -oN Nmap1 -p- - Search for ports --open - List open ports -sC - Use a set of reconnaissance scripts -sV - Find the version of the open s...50 readsDockerLabs
Vishwam Patelhoneypot.hashnode.dev·Aug 13, 2024Honeypots Explained: A Comprehensive OverviewIntroduction Definition of a honeypot: A honeypot is a security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Purpose and significance The purpose and significance of a honeypot ...whiteevil
sansquaresansquare.hashnode.dev·Aug 3, 2024The Rising Threat of Cyberwarfare: A New Era of ConflictCyberwarfare has emerged as a significant and evolving threat in the 21st century, with nation-states, hacktivist groups, and criminal organizations increasingly leveraging cyberattacks as a potent weapon. These attacks can disrupt critical infrastru...Tech InsightsSecurity
Ananya Chatterjeedevelover.hashnode.dev·Jul 30, 2024My bug bounty methodology and how I approach a targetHow I choose a bug bounty program , let’s assume you have received some private invitations. How would you choose between them? What program would you pick to start hunting for bugs? On HackerOne where I primarily hunt for bugs, I choose a program ba...1 like·107 readsBug Bounty#cybersecurity
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...jpfdevs cybersec
Ferdi birgülferdibirgul.hashnode.dev·Apr 25, 2024Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Ferdi BirgülLearn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black ...1 like·29 readsredteaming