TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Nov 28, 2023An In-Depth Analysis of Google Chrome Extension Vulnerabilities and Securityhttps://tutorialboy24.blogspot.com/2023/11/an-in-depth-analysis-of-google-chrome.html Introduction Create a directory that has automatically synced and beautified the source code of Google Chrome extensions hosted in the Chrome Web Store. Search f...DiscussGoogle Chrome
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Nov 23, 2023Unveiling the Unauthenticated Command Execution Vulnerability in Cisco IOS XE System WebUIhttps://tutorialboy24.blogspot.com/2023/11/unveiling-unauthenticated-command.html This article will analyze and summarize the recent critical CVEs (CVE-2023-20198, CVE-2023-20273) in Cisco IOS XE. Environment Setup A Cisco ISR 4300 router for resea...Discuss#cybersecurity
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Nov 22, 2023Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security LandscapeOverview Recently, a security team disclosed a vulnerability in Confluence called SafeParameterFilter, which allows an unauthenticated remote attacker to bypass XWork functionality to create new administrative user accounts. We took this opportunity ...DiscussCVE-2023-22515
Oluchi Ofooluchiofo.hashnode.dev·Oct 20, 2023Cybersecurity 101: A Beginner's Guide to Learning about CybersecurityIntroduction: Cybersecurity is all about protecting your digital information from unauthorized access and malicious activities. In this beginner's guide, I will introduce you to the basic concepts of cybersecurity and provide practical tips to help y...Discuss·1 likecybersecurity
Diwas Parajulidiwasparajuli.hashnode.dev·Oct 16, 2023Cloud Computing Part IICloud Infrastructure Physical data center Compute Network Storage Physical data centers Grouped/housed into regions, zones, and data centers Regions: location where a cloud’s infrastructures are clustered. Regions are isolated from each other....Discuss·1 likeCloud Computing
Anuj Singh Chauhananujcybersec.hashnode.dev·Oct 14, 2023Understanding Information GatheringInformation Gathering is the first phase of the 8 Penetration Testing Phase which are 1. Information Gathering 2. Enumeration 3. Vulnerability Scanning 4. Exploitation 5. Post Exploitation 6. Privilege Escalation 7. Maintaining Persistent Access 8. C...Discusspenetration testing
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Oct 10, 2023A Malicious Python Repository fshec2 PyPI Attack AnalysisSource :- https://tutorialboy24.blogspot.com/2023/10/a-malicious-python-repository-fshec2.html Introduction PyPI (Python Package Index) is Python's official package indexing and distribution platform. It is a public, global repository for storing, pu...Discuss#cybersecurity
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Oct 9, 2023KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784Source :- https://tutorialboy24.blogspot.com/2023/10/keepass-memory-leakage-vulnerability.html Introduction KeePass is an open-source password management software. It is designed to help users store and manage their passwords and sensitive informatio...Discussvulnerability
Petro CherkasetsforOSINT TEAMosintteam.hashnode.dev·Oct 2, 2023Social Media Intelligence (SOCMINT) - Practical tips & toolsSocial Media Intelligence (SOCMINT) is a type of Open Source Intelligence (OSINT), which refers to the collection and analysis of data from social media websites. It includes all social media platforms, not only social networking sites. Intelligence ...DiscussOSINT
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 1, 2023Introduction to NCSAMHey there, Hackerace fam! You know what's cool? October—it's not just about pumpkin spice lattes and Halloween. It's also National Cybersecurity Awareness Month (NCSAM). The main objective of NCSAM is to promote cybersecurity awareness and education ...Discuss·54 likes·78 reads#cybersecurity