BinFin Techbinfintech.hashnode.dev·Sep 22, 2023Introduction to Computer Networking1) What is computer networking? Computer Networking is referred to as the process of connecting various computing systems and devices so they may communicate with one another. 2) What are the different types of connections in computer networks? A) Co...Discussethicalhacking
muhammad zubairmuhammadzubair.hashnode.dev·Sep 22, 2023🔐 Cracking the Code: OSCP 2023 Exam Preparation GuideAre you ready to embark on a journey into the exciting world of ethical hacking and penetration testing? The Offensive Security Certified Professional (OSCP) certification is your ticket to becoming a certified ethical hacker. 🎓 🛡️ Understanding th...Discussoscp
Hacktushacktus.hashnode.dev·Sep 18, 2023OAuth Misconfiguration Leading to Unauthorized Admin Access For All Org ProductsTL;DR ? I signed up using any unclaimed email on application_2 (e.g., victim@example.com) due to no email verification, then logged into the victim's account on application_1 using the SSO feature that allowed me to log in using application_2. Introd...Discuss·10 likes·996 readspenetration testing
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023ExploitationOverview The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous phase. The exploitation phase is important because: It helps to determine the severity of the vulne...DiscussPenetration Testing PhasesExploitation
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023Vulnerability ScanningOverview Vulnerability scanning is a critical phase in the penetration testing process, where the primary goal is to identify potential vulnerabilities and weaknesses in the target system or application. The purpose of this phase is to determine the ...Discussvulnerability scanning
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023Information GatheringOverview Information gathering is a critical phase of the penetration testing process, where the primary goal is to collect as much data as possible about the target system or application. The aim of this phase is to identify potential vulnerabilitie...Discusspenetration testing
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023Penetration Testing PhasesOverview Penetration testing, also known as pen testing, is a process of testing computer systems, networks, or web applications to identify vulnerabilities that could be exploited by attackers. Pentesting is a critical component of an organization's...DiscussPenetration Testing Phasespenetration testing
Utkarsh Mishraowasptopten.hashnode.dev·Sep 18, 2023📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks📝 Title: Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks Hey there, my fellow cybersecurity adventurer! I've just returned from an exhilarating expedition through the treacherous terrain of the OWASP Top 1...Discuss#cybersecurity
dylanhashofdarkness.hashnode.dev·Sep 17, 2023PJPT Writeup and Review(TL:DR at the bottom) Practical Junior Penetration Tester The PJPT is a simulated real-world internal pentest from TCM Security. To be awarded the PJPT certification, students have 48 hours to move vertically within an Active Directory network and ul...Discuss#cybersecurity
Pradip Deyp3ntesterinstanc3.hashnode.dev·Sep 17, 2023CozyHosting HTB Writeup/WalkthroughThe “CozyHosting” machine is created by “commandercool”. This is an easy machine with a strong focus on web application security vulnerabilities which enables us to get the reverse shell of the machine. So, let’s start… Enumeration Using Nmap nmap -s...Discuss·1 like·29 readshtb-academy