Luis Diego Ragablog.ragab0t.com·Nov 27, 2024Hack the Box - Heist Walk-throughThis blog is related to Computer Security and Ethical hacking and does not promote hacking, cracking, software piracy or any kind of illegal activities. The blog is for informational and educational purpose and for those willing to learn about ethica...Discuss·1 like·59 readsHack the Boxhacking
yamini kyaminik.hashnode.dev·Nov 19, 2024Why Penetration Testing Matters in CybersecurityAs a cybersecurity specialist, I’ve seen how quickly cyber threats evolve and how devastating they can be when organizations aren’t prepared. Every day, hackers find new ways to exploit vulnerabilities, and it’s my job and passion to help businesses ...Discusspenetration testing
Sergio Medeirosgrumpz.net·Nov 10, 2024My Journey to Passing the CAPenX Certification: A Guide for Aspiring Expert-Level AppSec PentestersIntroduction: As a seasoned cybersecurity researcher and penetration tester, I am constantly on the lookout for certifications that sharpen my skills and keep me at the forefront of web application security. The Certified AppSec Pentesting Expert (CA...Discuss·10 likes·104 readssoftware development
Anuj Singh Chauhananujcybersec.hashnode.dev·Nov 9, 2024Title: Enhancing Reverse Shell Interactivity with Python's pty ModuleIn the world of cybersecurity, reverse shells play a crucial role in penetration testing, allowing security professionals to interact with remote systems from a compromised session. But, a raw reverse shell often lacks the interactivity needed for ef...Discusspenetration testing
Aboelhamd Abdellatifaboelhmd.com·Nov 6, 2024Beginner Cybersecurity Tools: A Practical Guide to Wireshark, Nmap, and MetasploitIntroduction In the world of cybersecurity, tools like Wireshark, Nmap, and Metasploit are essential starting points for anyone looking to understand networks and digital security. Whether you're a novice eager to explore network analysis, scanning, ...Discuss#CyberTools
1lrocks1l.rocks·Oct 18, 2024Getting started or finishing the OSCP (PEN-200) courseIntroduction First of all, I’d like to share that I have submitted my exam and the report. From now on, it's just waiting for the results and praying that the results are good. The paranoia is getting there. NOTE: I did receive the certificate :) The...Discusspen200
Kuldeep YadavforBreachForcebreachforce.net·Oct 17, 2024Secure Your Node.js Applications: Top 10 Critical Vulnerabilities to Identify and Prevent Major ThreatsHave you ever had one of those moments when you feel confident about the code you’ve written — until a VAPT (Vulnerability Assessment and Penetration Testing) team reviews it? Suddenly you’re faced with a sea of red flags and dire warnings. Words lik...Discuss·122 readsNode.js
Krzysztof Kałamarskikkalamarski.me·Oct 17, 2024Automate Your Web Security: Mastering Authenticated ZAP Scans with the ZAP Automation FrameworkAs developers, we strive to deliver secure systems to our clients. However, with large applications and hundreds of potential vulnerabilities and attacks, performing manual security testing for each new release can be a daunting task. Fortunately, th...Discusszap
Fizza Jatniwalafizzajatni.hashnode.dev·Oct 16, 2024Penetration Testing for APIs: Tools and Methods to Secure API EndpointsAPIs (Application Programming Interfaces) are the backbone of modern web and mobile applications, enabling communication between different software systems. However, APIs also present an attack surface that hackers can exploit to gain unauthorized ac...Discusspenetration testing
Vijayashree Shindevijayashree44.hashnode.dev·Oct 10, 2024Implementing a Robust Penetration Testing Framework: Key Techniques and Best PracticesIn an era where cyber threats are increasingly sophisticated and pervasive, organizations face mounting pressure to safeguard their digital assets. According to a recent study, 83% of organizations experienced a successful cyber-attack in the last ...DiscussSecurity