Ugwu Favour Chisomcybersafe-with-favour.hashnode.dev·15 hours agoBust These Top 10 Cybersecurity Myths and Stay Safe OnlineCybersecurity might seem like a complex topic best left to IT experts, but it's important for everyone! Whether you're a grandparent browsing Facebook or a teen gaming online, staying safe in the digital world is essential. Let's debunk some common m...#cybersecurity
Sreedeep cvsreedeep.hashnode.dev·Jan 3, 2025Find Emails of People Online through OSINT TechniquesFinding emails and additional information about people can be tryicky. Why not use some Opensource intelligence methods to find people, details, email etc. Disclaimer! Do not misuse the information for unethical purposes. Let’s go. First let me intro...50 likestools
INDRAYAN SANYALsecurityidiots.hashnode.dev·Jan 3, 2025Hacking SAML Part: 2Required Tools : SAML Raider - burp extension (Includes “SAML Raider certificates” tab) SAML Editor - burp extension SAML tracer - browser plugin Common Findings : SAML Certificate Validity SAML Signature Validation XML Signature Wrap...hacking
INDRAYAN SANYALsecurityidiots.hashnode.dev·Jan 2, 2025Hacking SAML Part: 1What is SAML Security Assertion Markup Language is an XML-based framework for authentication and authorization between two entities: a Service Provider and an Identity Provider. (Includes B2B and B2C). It is an open standard for exchanging authentica...Pentesting SAML
Blessing Mufaro Kashavathecyberstash.hashnode.dev·Dec 31, 2024BSides Cape Town 2024Exactly a year after my first BSides event, I returned to Cape Town on the 5th of December 2024 for another invigorating experience. This time, I was not only a volunteer but also a speaker—a milestone that added a new dimension to my journey in the ...#cybersecurity
0xryzn1ghtm4r3.hashnode.dev·Dec 26, 2024Bug Bounty Cartel Stories - December EditionWelcome to the December Edition of the Bug Bounty Cartel Stories This month has been an incredible journey, filled with numerous challenges, valuable lessons, and, of course, a lot of bugs! From the 7th of last month to the 15th of this month, I deci...3 likes·77 readsThe Bug Bounty Cartel Stories#cybersecurity
Santhoshprogrammerzero.hashnode.dev·Dec 26, 2024BellaCiao Just Got an Upgrade: Meet BellaCPP, the Smarter, Stealthier Threat!BellaCiao! Nahh, not the song! It’s about Charming Kitten’s (again, not a real KITTEN!!) AKA APT35 or SandStorm’s malware. Yes, you heard it right, a malware named BellaCiao! So what’s special about this malware? What sets it apart from every other c...1 like·34 readsbellaciao
jamarirjamarir.hashnode.dev·Dec 22, 2024[HackTheBox] HeistJust another CISCO 5 Password / ProcDump Leak Write-up. Machine link. Ippsec Walkthrough. Footprinting Open ports The open ports are 80 (HTTP), RPC (135/49669), 445 (SMB) and 5985 (WinRM): kali@kali:~$ nmap -p- -v10 -Pn --disable-arp-ping -oN tcp_f...Active Directory / WindowsCTF
jamarirjamarir.hashnode.dev·Dec 20, 2024[HackTheBox] BastionJust another VHD Mountage / SAM Decryption / Quick AMSI Bypass / mRemoteNG Password Decryption Write-up Machine link. IppSec Walkthrough. Footprinting Open ports The open ports are: jamarir@kali:~$ nmap -sS -p- -v -Pn --disable-arp-ping -oA syn_ful...Active Directory / WindowsCTF
Jithu Josephjithu-joseph.hashnode.dev·Dec 20, 2024Navigating the Deepfake DilemmaWhat Are Deepfakes?Deepfakes are highly realistic but fake media - videos, images, or audio created using AI. By analyzing large amounts of real-world data, AI algorithms can mimic a person’s appearance, voice, and mannerisms so convincingly that it ...Security