Japz DivinoforPINOY WHITE HATh4nt3rx.hashnode.dev·Aug 7, 2023HackerOne redacted usernames disclosure in "Export as .pdf" featureSeverity: Low (3.4)Weakness: Sensitive Information DisclosureBounty: $500 Hello hunters! I just want to share these new findings on the HackerOne bug bounty platform. First, I just wanna let you know that I disagree with the rated severity being Low...Discuss·425 readsbugbounty
WhatDoesKmean?loggar.hashnode.dev·Jul 3, 2023Decoding Wazuh Security Alerts: Unveiling the Mystery Behind UncertaintyIntroduction Despite implementing robust security measures, it is not uncommon to encounter odd security alerts that leave us questioning their true significance. Sometimes, in the middle of a constant stream of notifications, we can find ourselves s...Discuss·7 likes·756 reads#cybersecurity
Omer RosenbaumforfreeCodeCampfreecodecamp.org·Jan 23, 2023Learn Wireshark – Computer Networking TutorialIn this post, you will learn about the single most important and useful tool in Computer Networks – Wireshark. This post relies on basic knowledge of computer networks. Be sure to check my previous post about the five layers model if you need a refre...Discusscomputer network
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Jan 16, 2023How to Become an Ethical Hacker in 2023 — A Step-by-Step GuideHave you wondered what it takes to be an ethical hacker? Ethical hacking is also known as “white hat” hacking or pentesting. It is the practice of using hacking techniques and tools to test the security of a computer system. The goal of an ethical ha...Discusscybersecurity
freeCodeCampforfreeCodeCampfreecodecamp.org·Dec 19, 2022How to Get Your First Job in InfoSecBy Megan Kaczanowski Getting your first job in information security (infosec, or cybersecurity) can be tough. It's (still) a relatively new industry, and job roles and descriptions aren't always consistent. Plus, it can be hard to figure out where t...Discusscybersecurity
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Dec 13, 2022SQL Injection Attacks – How to Use SQLMap to Find Database VulnerabilitiesDatabases are the backbone of any application. They give us a way to store and organize large amounts of data in a way that we can easily access, manage, and update it. From small businesses to large-scale enterprises, databases play a critical role ...Discusscybersecurity
freeCodeCampforfreeCodeCampfreecodecamp.org·Dec 13, 2022Cyber Security Certifications – What Certs to Get for a Career in InfosecBy Megan Kaczanowski Certifications aren't strictly necessary in order to get hired as a cybersecurity analyst (with the notable exception of many government jobs). But they can help you demonstrate to an HR recruiter or hiring manager that you have ...DiscussCertification
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Dec 5, 2022Gobuster Tutorial – How to Find Hidden Directories, Sub-Domains, and S3 BucketsThere’s much more to web servers and websites than what appears on the surface. The first step an attacker uses when attacking a website is to find the list of URLs and sub-domains. Web developers often expose sensitive files, URL paths, or even sub-...DiscussApplication Security
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Nov 18, 2022How to Use Hydra to Hack Passwords – Penetration Testing TutorialHydra is a brute-forcing tool that helps penetration testers and ethical hackers crack the passwords of network services. Hydra can perform rapid dictionary attacks against more than 50 protocols. This includes telnet, FTP, HTTP, HTTPS, SMB, databas...DiscussEthical Hacking
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Nov 17, 2022How to Crack Passwords using John The Ripper – Pentesting TutorialIf you are a pen-tester, cracking passwords is something you will be doing on a daily basis. This can include login passwords, file passwords, and almost anything that is protected using a password. John the Ripper (JtR) is a popular password-crackin...Discussinformation security