Mohammd Reza Geramiariyagerami.hashnode.dev·Jul 25, 2024Vulnerability Assessments🔍 Understanding Vulnerability Assessments: Protecting Your Digital Systems 🔍In the ever-evolving world of cybersecurity, staying ahead of potential threats is paramount. One of the key tools in our arsenal is the vulnerability assessment. But what ...Discuss#cybersecurity
microbytesecmicrobytesecurity.hashnode.dev·Jul 24, 2024TurboCharge Your Nmap Scan: Five Hacks 🧿🔍Overview: This post will explore five Nmap hacks and tips that security researchers and ethical hackers can use to optimize their scans, enhancing workflow and automation. Understanding Nmap Default Scan To grasp Nmap's scan timing, let's start with ...Discuss·40 reads#cybersecurity
Roohi Brooh201.hashnode.dev·Jul 24, 2024The Crucial Role of Penetration Testing in a Robust Cybersecurity StrategyIntroduction In today's hyper-connected digital landscape, cybersecurity has become a paramount concern for organizations of all sizes. With cyber threats evolving rapidly, the need for robust cybersecurity measures is more critical than ever. One of...Discusspenetration testing
アリフリュウzoelabbb.hashnode.dev·Jul 19, 2024What is XSS Attack?Cross-Site Scripting (XSS) is a type of security vulnerability typically found in web applications. It allows attackers to inject malicious scripts into web pages viewed by other users. These scripts can then execute in the context of the user's brow...DiscussXSS
Cyber Seklercybersekler.com·Jul 13, 2024Git Gone Wrong: Application Compromise via Exposed .git DirectoryEvery penetration test begins with reconnaissance, and my initial steps always involve looking for potentially interesting endpoints. During one engagement, I encountered an exposed .git endpoint and I will discuss how I exploited it to gain admin-le...Discuss·38 readspenetration testing
Ankush nidhiankushh.hashnode.dev·Jul 9, 2024Exploiting Http(80) Metasploitable from kali Linux walkthroughI hope you're already setup your lab installing Metasploitable and kali Linux on Vmware or any sandbox environment. If not you will not be able to perform this. Lets get started... Before exploiting what we do first? yes, you guessed right!! its port...Discussmetasploit
Harsh Tandelcybervenom.hashnode.dev·Jul 3, 2024Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and MitigationCryptocurrency exchanges are frequent targets for hackers due to the high value of digital assets they hold. Understanding common security vulnerabilities, knowing how to test them as an ethical hacker, and applying effective mitigation strategies ar...DiscussWeb3 Security
Kunal Jaglanblog.h00dy.me·Jun 30, 2024TryHackMe Publisher WriteUp | EasyLet's see what ports are open - nmap -sVC -T4 10.10.210.141 Nmap scan report for 10.10.210.141 Host is up (0.20s latency). Not shown: 998 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0...Discuss·73 readstryhackme
Solvenitesolvenitefr.hashnode.dev·Jun 25, 2024Library | TryHackMe WriteUpThis is quite an easy room in TryHackMe which uses brute forcing, enumerating and privilege escalating to find the flags. The objective of this room is to get user.txt and root.txt. This guide will give you context on how to go about the room. Enumer...Discusstryhackme
aisha javedcyberurdu.hashnode.dev·Jun 25, 2024Cybersecurity Level 2 - Hacking within Lab"سائبر سیکیورٹی کے ماہر بنیں اور جدید خطرات کے خلاف ہینڈ آن لیبز کے ساتھ دفاع کریں، بشمول کلائنٹ سائیڈ کے غلط استعمال اور سوشل انجینئرنگ کے حملے۔" کورس کا عنوان: سائبرسیکیوریٹی لیول 2 - لیب کے اندر ہیکنگ اس مضمون میں میں آپ کو بتاؤں گا کہ سائبرسیکیور...DiscussIntermediate Cybersecurity