Chidinma Ozoemenachidinmawrites.hashnode.dev·Oct 4, 2024Securing Your Digital Fortress: Understanding and Protecting Network ComponentsVirtual Network (VNet) A Virtual Network (VNet) is a logically isolated network within a cloud environment, like Azure or AWS. It allows you to securely connect and manage your resources, such as virtual machines (VMs), within the cloud1. VNets can b...Discussfirewall
MindMeld7mindmeld7.hashnode.dev·Aug 23, 2024Writeup Inj3ct0rs from DockerlabsLet's start our reconnaissance with a quick nmap scan: nmap -p- --open -sV -sC --min-rate=5000 -n -Pn 172.17.0.2 -oN Nmap1 -p- - Search for ports --open - List open ports -sC - Use a set of reconnaissance scripts -sV - Find the version of the open s...Discuss·48 readsDockerLabs
Vishwam Patelhoneypot.hashnode.dev·Aug 13, 2024Honeypots Explained: A Comprehensive OverviewIntroduction Definition of a honeypot: A honeypot is a security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Purpose and significance The purpose and significance of a honeypot ...Discusswhiteevil
sansquarestarlog.sansquare.in·Aug 3, 2024The Rising Threat of Cyberwarfare: A New Era of ConflictCyberwarfare has emerged as a significant and evolving threat in the 21st century, with nation-states, hacktivist groups, and criminal organizations increasingly leveraging cyberattacks as a potent weapon. These attacks can disrupt critical infrastru...DiscussTech InsightsSecurity
Ananya Chatterjeedevelover.hashnode.dev·Jul 30, 2024My bug bounty methodology and how I approach a targetHow I choose a bug bounty program , let’s assume you have received some private invitations. How would you choose between them? What program would you pick to start hunting for bugs? On HackerOne where I primarily hunt for bugs, I choose a program ba...Discuss·1 like·93 readsBug Bounty#cybersecurity
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...Discussjpfdevs cybersec
Ferdi birgülferdibirgul.hashnode.dev·Apr 25, 2024Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Ferdi BirgülLearn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black ...Discuss·1 like·27 readsredteaming
Sergio Medeirosgrumpz.net·Apr 22, 2024Uncovering an SSRF Vulnerability in PDFMyURL Affecting Numerous UsersWhile enumerating the scope of a target on a private bug bounty program, I came across a subdomain used for generating PDF files. However, it seemed out-of-scope as they were simply white labeling a service called PDFMyURL, which lets you convert any...Discuss·11 likes·1.4K readsMy Security Researchbugbounty
Ferdi birgülferdibirgul.hashnode.dev·Mar 9, 2024Blue Team Level 1 NotesCommon Ports PortServiceDescription 20,21FTPFile Transfer Protocol used to transfer files b/w systems. 22SSHSecure Shell Protocol allows users to securely connect to a remote host. 23TelnetUsed before SSH, allows users to connect to a remote...Discuss·10 likes·73 readsferdibirgül
theblxckcicadablxckcicada.hashnode.dev·Mar 9, 2024Life Lessons from the Hacking WorldI've been exploring the world of cybersecurity and hacking for some time now. It's a vast field with different specializations just like any other tech-related area. Rather than delving into the technical aspects of hacking, I'd like to share what I'...Discuss·149 reads#cybersecurity