Ferdi birgülferdibirgul.hashnode.dev·Apr 25, 2024Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Ferdi BirgülLearn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black ...Discussredteaming
Sergio Medeirosgrumpz.net·Apr 22, 2024Uncovering an SSRF Vulnerability in PDFMyURL Affecting Numerous UsersWhile enumerating the scope of a target on a private bug bounty program, I came across a subdomain used for generating PDF files. However, it seemed out-of-scope as they were simply white labeling a service called PDFMyURL, which lets you convert any...Discuss·10 likes·641 readsMy Security Researchbugbounty
Ferdi birgülferdibirgul.hashnode.dev·Mar 9, 2024Blue Team Level 1 NotesCommon Ports PortServiceDescription 20,21FTPFile Transfer Protocol used to transfer files b/w systems. 22SSHSecure Shell Protocol allows users to securely connect to a remote host. 23TelnetUsed before SSH, allows users to connect to a remote...Discuss·10 likes·63 readsferdibirgül
Bafedile Sebataneblog.blxckcicada.co.za·Mar 9, 2024Life Lessons from the Hacking WorldI've been exploring the world of cybersecurity and hacking for some time now. It's a vast field with different specializations just like any other tech-related area. Rather than delving into the technical aspects of hacking, I'd like to share what I'...Discuss·141 reads#cybersecurity
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Linux Operating SystemWhat is Linux? Linux is a powerful and flexible family of operating systems that are free to use and share. It was created by a person named Linus Torvalds in 1991. What’s cool is that anyone can see how the system works because its source code is op...Discuss#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Client Server ArchitectureWhat is Client Server Architecture? The client-server architecture refers to a system that hosts, delivers, and manages most of the resources and services that the client requests. In this model, all requests and services are delivered over a network...Discuss#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Ipconfig CommandWhat is IPCONFIG COMMAND? IPCONFIG is a System Service Tools (SST) Advanced Analysis command that allows viewing or altering IP configuration settings not available through the standard TCP/IP configuration menus. What are the Benefits of IPconfig? ...Discuss#ethi
Kajal Kumarikajalhacking.hashnode.dev·Mar 3, 2024ifconfig23 languages Article Talk Read Edit View history ifconfig Initial releaseAugust 1983; 40 years ago Operating systemUnix and Unix-like TypeCommand ifconfig (short for interface config) is a system administration utility in Unix-lik...Discussifconfig
DHAIRYA PATELdhairya1403.hashnode.dev·Feb 24, 2024DLL Hijacking - Window's easiest mistakeImagine you are in your kitchen, making some morning coffee. You need a spoonful of sugar, and naturally, you search it in your shelf (or atleast this have been the case till now). We can bring a little twist in this routine, by adding a Burglar. Ima...Discuss·4 likes#cybersecurity
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jan 25, 2024Seal - Hack The BoxReconnaissance First, we start with a full port scan to verify all possible open ports. ─[us-dedivip-1]─[10.10.16.200]─[jpfguedes@htb]─[~/htb/Seal] └──╼ [★]$ sudo nmap -v -sS -Pn -p- 10.10.10.250 PORT STATE SERVICE 22/tcp open ssh 443/tcp op...Discuss·71 readsoffensivesecurity