Mohamed Hegazih0kaz.hashnode.dev·Jul 25, 2024Day #3 | 100 Day of Python Programmingبِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيمِ Content Lists. Conditional statements: if elif else Loops: for while Practical Program. 1. Python Lists Lists in python are used to store multiple items in a single variable For Example vulner...Discuss100DaysOfCode
Neo Granicenneogranicen.hashnode.dev·Jul 24, 2024Edited Forked Code: A Sin And A Goldmine for Smart Contract AuditorsForking code might look like a great idea, and actually, it is. Developers get excessively audited code that they can edit to make it fit the specific needs of their protocol. But the problem is that if you look at the history of smart contract explo...Discuss·29 readsSmart Contracts
microbytesecmicrobytesecurity.hashnode.dev·Jul 24, 2024TurboCharge Your Nmap Scan: Five Hacks 🧿🔍Overview: This post will explore five Nmap hacks and tips that security researchers and ethical hackers can use to optimize their scans, enhancing workflow and automation. Understanding Nmap Default Scan To grasp Nmap's scan timing, let's start with ...Discuss·41 reads#cybersecurity
Mallika Gautamvbnm.hashnode.dev·Jul 23, 2024Cybersecurity Skills: Day 23 of the 100-Day Learning JourneyOpen source intelligence Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding we...Discussday23
Antarip Chatterjeeantarip4.hashnode.dev·Jul 22, 2024About Cyber SecurityCybersecurity involves protecting computer systems, networks, and data from digital attacks, theft, and damage. This field includes a variety of practices and measures designed to safeguard information and maintain the integrity, confidentiality, and...Discuss·2 likeshacking
MindMeld7mindmeld7.hashnode.dev·Jul 21, 2024Writeup Vulnerame from DockerlabsYou have two options: READ or WATCH me on YouTube how I complete this CTF Machine. Do not press the Subscribe Button, It's ILLEGAL 😁😆😅😂🤣 https://www.youtube.com/watch?v=tvIu5Vj3QuQ Let's start our reconnaissance with a quick nmap scan: nmap -...Discuss·9 likes·32 readsCTF
MindMeld7mindmeld7.hashnode.dev·Jul 20, 2024Writeup HiddenCat from DockerlabsYou have two options: READ or WATCH me on YouTube how I complete this CTF Machine. Do not press the Subscribe Button, It's ILLEGAL 😁😆😅😂🤣 https://www.youtube.com/watch?v=7ZK1Y0aV7oE Let's start our reconnaissance with a quick nmap scan: nmap -...DiscussCTF
Mallika Gautamvbnm.hashnode.dev·Jul 19, 2024Cybersecurity Skills: Day 22 of the 100-Day Learning JourneyThe rise of SSO and MFA Most companies keep their data safely locked up behind authentication systems. Usernames and passwords are the keys that unlock information for most organizations. But are those credentials enough? Information security often ...Discussday22
The Intel Chroniclesintelchronicles.com·Jul 19, 2024One Shell To Rule Them All ReleasedExecutive Summary On July 16, 2024, cybersecurity firm Tanto Security (known as @TantoSecurity on X, previously Twitter) introduced a new tool called oneshell in a detailed write-up. Oneshell is designed to simplify the creation and deployment of cro...DiscussThreat Intelligenceexploit
Mallika Gautamvbnm.hashnode.dev·Jul 18, 2024Cybersecurity Skills: Day 21 of the 100-Day Learning JourneyCore Understanding of risks, threats, and vulnerabilities Security risk Security plans are all about how an organization defines risk. However, this definition can vary widely by organization. As you may recall, a risk is anything that can impact the...Discussday21