© 2023 Hashnode
#hacking
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illic…
In today's digital age, the threat of hackers is ever-present. Hackers can cause significant harm, from stealing your personal information to taking control of your device. It's essential to take meas…
Secure coding is crucial in the development of software to ensure the protection of sensitive data and prevent security breaches. For developers working with the C and C++ programming languages, here …
Fedora Linux is a popular operating system that offers robust security features to protect users’ systems from threats. However, there are always additional steps that you can take to strengthen secur…
This guide demonstrates the easiest method for installing Kali Linux on Virtual Box on Windows and Linux. One of the greatest Linux distributions for those interested in security and hacking is Kali L…
Wow, I showed up with a post. Well, it is the first proper post on this blog, so naturally, there would be some kind of enthusiasm there. I figured that we should start with a bang, and then see how things go from there.One of the most dy…
Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. In this blog, we are going to learn about what are JWTs (JSON Web Tokens) and how we can exploit them. We will also see some advanced techniques to exploit …
#Cybersecurity #sqlinjection What is SQL Injection? SQL injection usually occurs when you ask a user for input, like their username/userid, and instead of a name/id, the user gives you an SQL statemen…
I wanted to check: how efficient is it to mine Monero cryptocurrency in 2023? Why Monero? Because it is CPU optimized and I like the fact that it is very secure. A lot of Darknet moved to Monero these days. Execution I bought a virtual ma…
I've been using fireprox to defeat rate limiting with great success. This tool sets up a pass-through-proxy in AWS API Gateway which is mapped to a specific target URL. It allows an attacker to rotate…