Gabriele Biondoblog.reveng3.org·16 hours agoThe components of a HID attackAbstract In the first article of this series, we introduced hotplug attacks. Here we will dwell more in detail, and make a few considerations on how these attacks should be mounted. A few considerations on how the attack should be done Consider that ...DiscussBadUSB ProjectHID
Atharv Patilatharvpatil.hashnode.dev·Oct 13, 2024Nihilism and Cybersecurity: Guarding Against the Digital AbyssSo, as a 22-year-old navigating the complexities of life, I find myself exploring anything and everything that catches my eye be it philosophy, art, literature, programming and hacking its an endless list, and this constant search for knowledge and q...Discuss·1 likenihilism
Messede DegodforKnowledge Baseiq.thc.org·Oct 10, 2024Bypassing noexec and executing arbitrary binariesTL;DR: Execute a binary on a Linux system when execution is not allowed (e.g. restricted PHP environment, read-only filesystem or noexec mount flag). By using only Bash and making syscall(2)’s from Bash (!) and piping the ELF binary straight from the...Discuss·1.4K readshacking
Gabriele Biondoblog.reveng3.org·Oct 9, 2024BadUSBAbstract Human Interface Devices attacks are as powerful as disregarded. In this article, we'll define the foundations of this family of attacks, the underlying concepts, and why this kind of attack can be a game changer for a successful intrusion te...Discuss·37 readsBadUSB ProjectSecurity
Adarsh L Kadarshlkdev.hashnode.dev·Oct 9, 2024How to Get Involved in Open Source During Hacktoberfest and Collect Great SwagsHacktoberfest is an annual event that promotes open-source contributions, offering participants the chance to earn exclusive swags and badges. It’s a fantastic opportunity for developers of all skill levels to engage with meaningful projects, enhance...Discuss·10 likes#hacktoberfest
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Oct 8, 2024How to Improve Your Hacking Skills by Playing OverTheWire WargamesHacking is a skill that fascinates many people. You’ve seen hackers in movies. They type at keyboards, breaking into high-security systems in seconds. But real hacking isn’t quite like that. It takes patience, creativity, and most importantly, a lot ...Discuss·1 likeEthical Hacking
Morteza Karamiforroadmap Bug Hunterbug-map.hashnode.dev·Oct 7, 2024Road Map Bug BountyAll Link : Main sources for Bug Bunty roadmap In this article, I mostly try to include useful and practical resources that can be implemented and used in the real world . Roadmap Hunter BugDiscussbugbounty
Yunis Mohamedmycybersecjourney.hashnode.dev·Oct 7, 2024My Journey Into CybersecurityHi, I’m Yunis Mohamed, an aspiring offensive security professional passionate about safeguarding the digital world. My journey into cybersecurity is fueled by curiosity, a commitment to protection, and a belief in our collective role in creating a sa...Discusscybersecurity
elc4br4elc4br4.hashnode.dev·Oct 6, 2024Shared - HackTheBoxReconocimiento Reconocimiento de Puertos🔍 Como siempre comienzo con el reconocimiento, pero antes de lanzar la utilidad nmap, lanzo el script Whichsystem.py que sirve para identificar el sistema operativo de la máquina a la que me voy a enfrentar. E...Discuss·1 likeHackTheBox🦎CTF Writeup
Atharv Patilatharvpatil.hashnode.dev·Oct 6, 2024Understanding Common Security Gaps in IoT DevicesI was probably in school when Home Alone first came out, and God, it was fun to watch as a kid! In an age where smart devices are popping up faster than Kevin McCallister’s ingenious traps, the importance of securing these Internet of Things (IoT) de...Discussiot