Vijayashree Shindevijayashree44.hashnode.dev·Dec 19, 2024A Complete Guide to Testing Web Applications for Security VulnerabilitiesCybercriminals are increasingly targeting web applications, making their security more critical than ever. 43% of all data breaches in 2021 were linked to vulnerabilities in web applications, according to the Verizon Data Breach Investigations Report...penetration testing
Nachiket Patelplasmorix.hashnode.dev·Dec 15, 2024Wi-Fi Hacking: Deauthentication AttackDisclaimer: This blog is intended solely for educational and ethical purposes. The information provided here is aimed at raising awareness about cybersecurity threats and promoting the importance of securing wireless networks. All activities were con...32 readsDeauthentication Attack
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Burpsuite The BasicsTASK 1 - Introduction Welcome to Burp Suite Basics! This particular room aims to understand the basics of the Burp Suite web application security testing framework. Our focus will revolve around the following key aspects: A thorough introduction to ...Burpsuite
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Authentication BypassTASK 1 - Brief In this room, we will learn about different ways website authentication methods can be bypassed, defeated or broken. These vulnerabilities can be some of the most critical as it often ends in leaks of customers personal data. Start the...satvik
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Linux 101Linux Structure History Many events led up to creating the first Linux kernel and, ultimately, the Linux operating system (OS), starting with the Unix operating system's release by Ken Thompson and Dennis Ritchie (whom both worked for AT&T at the tim...Linux
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024John The RipperHello Hackers 🚀 Today we will be solving the challenges in John The Ripper room on TryHacKMe TASK 1 - John Who Welcome John the Ripper is one of the most well known, well-loved and versatile hash cracking tools out there. It combines a fast cracking...ethicalhacking
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Encryption 101TASK 1 - What will this room cover? This room will cover: Why cryptography matters for security and CTFs The two main classes of cryptography and their uses RSA, and some of the uses of RSA 2 methods of Key Exchange Notes about the future of enc...Entrepreneurship
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Nmap Post Port Scan TechniquesTASK 1 - Introduction: This room is the last in the Nmap series (part of the Introduction to Network Security module). In this room, we focus on the steps that follow port-scanning: in particular, service detection, OS detection, Nmap scripting engin...1 likeNetwork Mapper - NMAPnmap
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024NMAP Advanced Port Scan TechniquesCheatsheet of the commands used in this room Port Scan TypeExample Command TCP Null Scansudo nmap -sN 10.10.214.83 TCP FIN Scansudo nmap -sF 10.10.214.83 TCP Xmas Scansudo nmap -sX 10.10.214.83 TCP Maimon Scansudo nmap -sM 10.10.214.83 TCP...Network Mapper - NMAPnmap
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Basic Port Scans - NMAPNmap Basic Port Scans INTRODUCTION The next step would be checking which ports are open and listening and which ports are closed. Therefore, in this room and the next one, we focus on port scanning and the different types of port scans used by nmap. ...Network Mapper - NMAPnmap