BrowserScanbrowserscan.hashnode.dev·Jun 13, 2024What Is a Bot and How Does It Work?Bots, or internet robots, are software applications designed to perform tasks automatically, often replacing human effort. They follow instructions from their creators to handle tasks ranging from data scraping and customer service to managing routin...bots
K.boopathiprogrammerraja.hashnode.dev·May 4, 2024A Journey into Unseen Threats on our VMAs the sun set on a typical Saturday evening, I found myself engrossed in a blog titled “Visualizing Malicious IP Addresses.” The author shared clever ways to detect unauthorized attempts to access virtual machines via SSH, using commands like: $ jou...2Articles1Week
Haneunhanlee.hashnode.dev·Aug 21, 2023Cyber Security: File Upload Cheet SheetFile Upload Bypass Methods NULL Byte Bypass webshell.php%00.jpg By inserting a NULL Byte in the middle, as in webshell.php%00.jpg, the processed filename becomes "webshell.php." The NULL Byte signifies the end of a string. HTML Encoding In cases whe...Cyber Security#cybersecurity
Haneunhanlee.hashnode.dev·Aug 21, 2023Cyber Security: What is File UploadDefinition File upload attacks involve malicious users uploading files to web applications or websites to exploit security vulnerabilities. Typically, web shell files are uploaded. Cyber Security: What is Web Shell List of Vulnerable Points Types of...Cyber Securitycybersecurity