REHAN SAYYEDdignitas.hashnode.dev·2 hours agoActiveIP: 10.129.40.252 Let’s start with the nmap scan nmap -sC -sV -o nmap 10.129.40.252 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-07 12:40 EST Nmap scan report for 10.129.40.252 Host is up (0.27s latency). Not shown: 983 closed tcp ports (reset...HackTheBoxhacking
REHAN SAYYEDdignitas.hashnode.dev·15 hours agoBusquedaIP: 10.129.228.217 Let's start with the Nmap scan. nmap -sC -sV -o nmap 10.129.228.217 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-06 11:38 EST Nmap scan report for 10.129.228.217 Host is up (0.35s latency). Not shown: 998 closed tcp ports (r...10 likesHackTheBoxhacking
JENISH PAGHADALffuf.hashnode.dev·3 hours agoParameter FuzzingParameter fuzzing is the process of discovering hidden, undocumented, or vulnerable parameters in web applications by sending a large number of test requests. It is an essential technique in web application security testing, bug bounty hunting, and p...Web Development
JENISH PAGHADALffuf.hashnode.dev·3 hours agoBasic FuzzingDirectory Fuzzing As we can see from the example above, the main two options are -w for wordlists and -u for the URL. We can assign a wordlist to a keyword to refer to it where we want to fuzz. For example, we can pick our wordlist and assign the key...#cybersecurity
P S Mohammed AliforfreeCodeCampfreecodecamp.org·5 hours agoWhat is Penetration Testing in Cybersecurity? A Beginner's GuideIn today's digital world, almost every activity we engage in is intertwined with technology. From making payments via UPI and booking movie or travel tickets online to selling products through e-commerce platforms, technology has become an integral p...Security
Khoa Nguyenkhoafrancisco.hashnode.dev·19 hours agoIntroduction to HackerOne Hacker101 CTFGiới thiệu Trong thế giới an ninh mạng, việc thực hành và rèn luyện kỹ năng là điều cực kỳ quan trọng. Một trong những cách tốt nhất để làm điều đó là tham gia các cuộc thi CTF (Capture The Flag). Nếu bạn đang tìm kiếm một nền tảng để luyện tập kỹ n...6 likeshacking
bst04cybersources.hashnode.dev·Feb 6, 2025PentesterGPT: Your AI-Powered Sidekick for Ethical HackingIn the ever-evolving world of cybersecurity, tools are constantly being developed to help ethical hackers stay ahead of potential threats. One such innovation is PentesterGPT, an AI-driven assistant designed specifically for penetration testers and s...10 likesResourcescybersources
Kevinai-development-trends.hashnode.dev·Feb 6, 2025AI vs Hackers: Shaping the Future of CybersecurityAs technology advances, so does the sophistication of cyber threats. Hackers are constantly developing new tactics to exploit vulnerabilities, making traditional cybersecurity measures insufficient. Enter artificial intelligence (AI) — a game-changer...AI
ZEROzerosama.hashnode.dev·Feb 5, 2025PostfishThe "Postfish" CTF provided valuable experience in exploiting email services and leveraging privilege escalation techniques. By combining tools like Nmap, smtp-user-enum, Hydra, and custom scripts, I was able to systematically enumerate the target, e...Proving Groundsoffsec
Jonas Satkauskascyberjourney.eu·Feb 5, 2025Foundations of Hacking: Essential Concepts for BeginnersIntro Cybersecurity and hacking are among the most popular fields in 2025. Which are the most important topics in this field? Foundations A network is a collection of interconnected computers. Kind of a big web of computers connected with wires. To e...Linux