Prajoti Raneprajotirane.hashnode.dev·5 hours agoLinkedIn Data Breach: Analyzing the 2012 breach resulting in stolen user credentials.Technical Analysis of the 2012 LinkedIn Data Breach: Decrypting the Theft of User Credentials The 2012 LinkedIn data breach remains one of the most notable incidents in cybersecurity history, involving the compromise of millions of user credentials....DiscussBlogging
AfriMonin4fr1m0n1n.hashnode.dev·Apr 25, 2024How to evade NSA and CIA surveillance? Basic anonymity techniques for Black Hats.CAUTION: The title is solely for grabbing attention. Anonymity is crucial for circumventing authoritarian laws in your country and enhancing cybersecurity and operational security processes. Understanding that anonymity isn't solely for nefarious pur...DiscussIntelligence Agencieshacking
Corey Gardnercoreyscorner.hashnode.dev·Apr 25, 2024Safeguarding the Stack: Ornithology of Stack CanariesDuring the industrial era canaries were given the unforgiving job of determining if working conditions were "safe" for coal miners. Within coal mines toxic fumes can build up, and oxygen can become scarce. The life of the canary was a litmus test for...DiscussStack Overflow
0xshinPro0xshin.hashnode.dev·Apr 24, 2024SQL Injection Types Supported by SQLMap - SQL Map 01Objective: To provide a detailed, step-by-step guide on the various SQL injection types supported by SQLMap, enabling learners to understand and identify each type effectively. Introduction to SQLMap SQLMap is a powerful penetration testing tool for...DiscussCPTS Journeysqlmap
John Kelsey Irungujohnkelsey.hashnode.dev·Apr 24, 2024Insights from My Computer Science Journey: Key Learnings and AdviceHey there, fellow tech enthusiasts! I’m excited to continue with this article and share my journey in the world of computer science with you as a high school student. My name is John Kelsey, and ever since I was 3, I’ve been fascinated by technology ...Discusshacking
Yas NEGforHaysecblog.haysec.com·Apr 23, 2024CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtectDescription A vulnerability in the GlobalProtect feature of specific versions of Palo Alto Networks PAN-OS software, due to arbitrary file creation, could allow an unauthenticated attacker to execute arbitrary code with root privileges on the affecte...Discuss·1 likevulnerability
Narendra Jalamkarcodern.hashnode.dev·Apr 22, 2024Linux : Open Source Project Operating SystemSo today I m going to tell some little information about Linux operating system. Every tech geek is fascinated about linux operating system. ofcourse there is a behind the popularity of this linux os like some of the movies based on hacking some of t...Discuss·2 likesLinux
Sergio Medeirosgrumpz.net·Apr 22, 2024Uncovering an SSRF Vulnerability in PDFMyURL Affecting Numerous UsersWhile enumerating the scope of a target on a private bug bounty program, I came across a subdomain used for generating PDF files. However, it seemed out-of-scope as they were simply white labeling a service called PDFMyURL, which lets you convert any...Discuss·10 likes·640 readsMy Security Researchbugbounty
AfriMonin4fr1m0n1n.hashnode.dev·Apr 21, 2024Bluetooth Hacking: Sending Commands to a Bluetooth Device using BlueDuckyWelcome back Cyberwarriors! Bluetooth is a widely used protocol that enables communication between devices that are nearby or within a piconet, like speakers, headphones, and mobile phones. If a hacker manages to exploit Bluetooth, they could potenti...Discuss·40 readsbluetooth
MadiSecblog.huntcon.ir·Apr 20, 2024Domain discovery in bug bounty.Hi there, today I want to talk about Domain discovery in wide recon for bug hunters. Summary As a matter of fact, there are many different kinds of Domain discovery methodology. but, I want to write my methodology for this wide recon part. So, let's...Discuss·2 likesBug Bountybugbounty