K.boopathiprogrammerraja.hashnode.dev·May 4, 2024A Journey into Unseen Threats on our VMAs the sun set on a typical Saturday evening, I found myself engrossed in a blog titled “Visualizing Malicious IP Addresses.” The author shared clever ways to detect unauthorized attempts to access virtual machines via SSH, using commands like: $ jou...Discuss2Articles1Week
Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·12 likes·271 readsMy Security Researchhacking
HackerHQhackerhq.hashnode.dev·May 4, 2024Mailing HTB Writeup | HacktheBoxHack The Box New Machine Mailing Write-up In this Post, You will learn how to CTF Mailing from hackthebox and If you have any doubts comment down below I will help you 👇🏾 Full Write-up- https://www.hackerhq.tech/ Mailing is a 20-point machine on Ha...DiscussMailing HTB Writeup
Sumukh M Gsumukhmg.hashnode.dev·May 1, 2024"Here are some open source opportunities that you may want to consider applying for" (Part 1)Hacktoberfest: Hacktoberfest is DigitalOcean’s annual event that encourages people to contribute to open source throughout October. Much of modern tech infrastructure—including some of DigitalOcean’s own products—relies on open-source projects built ...Discuss·12 likes·88 readsGitHub
0xffchain0xffchain.hashnode.dev·Apr 29, 2024Detailed breakdown of the Wise lending hackPreamble The three cardinal rules and phases to performing an inflation attack on a protocol are: A way to get one key value to empty or almost empty A way to inflate another key value A way to exploit this resulting changes. "Daniel Von Fange" ...DiscussSecurity
Atharv Patilatharvpatil.hashnode.dev·Apr 29, 2024DDoS Attacks on IoT Devices: A Looming Threat to Our Connected WorldThe landscape of cybersecurity is evolving rapidly, but along with innovative solutions comes new avenues for threats. One concerning phenomenon that's gaining prominence is Distributed Denial of Service (DDoS) attacks targeting Internet of Things (I...Discuss#cybersecurity
Abiral Shresthadiary.abiralshrestha.com.np·Apr 28, 2024How to #Inject Database?SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass applicati...Discuss·1 like·32 reads#cybersecurity
Prajoti Raneprajotirane.hashnode.dev·Apr 26, 2024LinkedIn Data Breach: Analyzing the 2012 breach resulting in stolen user credentials.Technical Analysis of the 2012 LinkedIn Data Breach: Decrypting the Theft of User Credentials The 2012 LinkedIn data breach remains one of the most notable incidents in cybersecurity history, involving the compromise of millions of user credentials....DiscussBlogging
AfriMonin4fr1m0n1n.hashnode.dev·Apr 25, 2024How to evade NSA and CIA surveillance? Basic anonymity techniques for Black Hats.CAUTION: The title is solely for grabbing attention. Anonymity is crucial for circumventing authoritarian laws in your country and enhancing cybersecurity and operational security processes. Understanding that anonymity isn't solely for nefarious pur...Discuss·29 readsIntelligence Agencieshacking
Corey Gardnercoreyscorner.hashnode.dev·Apr 25, 2024Safeguarding the Stack: Ornithology of Stack CanariesDuring the industrial era canaries were given the unforgiving job of determining if working conditions were "safe" for coal miners. Within coal mines toxic fumes can build up, and oxygen can become scarce. The life of the canary was a litmus test for...DiscussStack Overflow