Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...Discussjpfdevs cybersec
Abhinandan Khuranablog.s3curity.ninja·Jul 13, 2024Creating a Nessus weekly scan automation for updated IPs every weekHello, tech enthusiasts! The inspiration for this task was to automate the annoying weekly Network Scan for my company every Sunday on all the public facing IPs (that are changed every week), so that we already know about known vulnerabilities and mi...Discuss·10 likes·27 readsnessus
John Ebinyi Odey hotwrist.hashnode.dev·Jul 11, 2024Functionality, Usability, and Security TriangleThe Security, Functionality, & Usability Triangle! The level of security of any system can be defined by the strength of these three components: 1. Functionality: This refers to the set of features provided by the system. 2. Usability: This refers to...DiscussCybersecurity#cybersecurity
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Jun 25, 2024Shields Up: How Cybersecurity Is Moving To New HeightsNone of us like to think too much about cybersecurity - it’s boring, right? But honestly, in today’s world, that’s just not a viable attitude. Why? One really simple reason: it’s constantly rising - and really rising. Cybercrime could cost $10.5 tril...DiscussCyber Security#cybersecurity
Archie Osuhcyberarchie.hashnode.dev·Jun 9, 2024🚨 The Snowflake Data Breach: What Went Down and How to Stay Safe! 🚨In May 2024, Snowflake, the cloud data giant, faced a massive data breach that sent shockwaves through the tech world 🌐. Hackers accessed sensitive data from big names like Ticketmaster and Santander by exploiting compromised credentials from a form...DiscussIAM,MFA,Access key ID,Secret access key
Raicode.flatmarstheory.com·May 30, 2024Mastering Pointers in CIn the ever-evolving landscape of software development, where artificial intelligence (AI) and supercomputers are pushing the boundaries of what's possible, the importance of secure and robust programming practices cannot be overstated. One foundatio...DiscussC
Raicode.flatmarstheory.com·May 30, 2024Mastering Memory Management in CIn the realm of modern computing, where artificial intelligence (AI) and supercomputers are pushing the boundaries of what's possible, the importance of secure and efficient programming practices cannot be overstated. One foundational aspect that und...Discussbuffer overflows
Blake JacobsforDorki - Blogdorki.hashnode.dev·May 28, 2024How I Discovered a Critical Path Traversal Vulnerability Using DorkiIn this article, I detail my journey of discovering a critical vulnerability using Secondary Context Path Traversal. By leveraging Dorki for passive reconnaissance, I identified an Apache Tomcat-hosted web app and exploited its path normalization fla...Discuss·939 readshacking
Blessing Mufaro Kashavathecyberstash.hashnode.dev·May 25, 2024openECSC 2024 - CTF WriteupGeneral Remarks CTF Page Link: https://open.ecsc2024.it/ openECSC has mostly medium to difficult challenges as it is designed to scout the best participants to battle in the grand finals in Italy, and ultimately at the International Cybersecurity Cha...Discuss·34 readsCTF WriteupsCTF Writeup
Q8 { Empowering Changeq08.org·May 19, 2024Redefining the Relationship Between Privacy, Security, and Personal Autonomy1. Introduction In an increasingly digital world, the concepts of privacy, security, and personal autonomy have become central to discussions about individual rights and societal norms. These three pillars, while distinct, are deeply interconnected. ...Discuss·1 likeprivacy