Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·13 likes·491 readsMy Security Researchhacking
0xiNPro0xshin.hashnode.dev·Apr 8, 2024Brute-Force Series - Basic HTTP Authentication and Brute-Forcing /w Hydra - 01A. Basic HTTP Authentication Scheme Concept: It’s a method for an HTTP server to request authentication from a client, using a username and password. The credentials are sent in headers, encoded with Base64. Process: The client sends a request wit...Discuss·124 readsCPTS Journeybruteforceattack
Abubaker Siddiqueabubakersiddique761.hashnode.dev·Oct 10, 2023Your Key to Understanding AES Encryption1. Installation: Ensure you have Kali Linux installed, as AESKeyFind is typically included in Kali Linux's repository. You can download Kali Linux from the official website if it's not already installed on your system: https://www.kali.org/downloads/...Discuss·1 like#cybersecurity
Rahul Kamilyakamilya.hashnode.dev·May 28, 2023Start your Career in Cyber SecurityWhat is cyber security? Cyber Security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber-attacks. The main purpose of cyber security is to protect all organizational assets ...Discuss·35 reads#cybersecurity
Jimut Mahatojimutmahato.hashnode.dev·Feb 3, 2023How To Hack Website Under 10 Months3 staps Brute Force Phishing Link Creack Web PageDiscuss·11 likes·45 readshacking