Reza RashidiforRedTeamReciperedteamrecipe.com·Jul 25, 2024RedTeam Story #1: XSS, LFI, LogrotateMITRE ATT&CK Techniques and Tactics Tactic: Reconnaissance Technique ID: T1595 Attack Context Reconnaissance is the phase where the attacker gathers information about the target system. This phase is critical for understanding the system's struct...Discuss·77 readsredteamstory
Amit Tyagiwww.cognitive-quest.com·Jul 21, 2024Red Teaming for GenAI ApplicationsWhat is Red Teaming? In today’s rapidly evolving digital landscape, ensuring the safety and security of generative applications has become a paramount concern. Traditionally, red teaming involves a group of security professionals, known as the red te...DiscussResponsible AIredteaming
Mahak Pandeymahakpandeyofficial.hashnode.dev·Jul 4, 2024Step-by-Step Guide to Finding Hidden Paths and Subdomains with GobusterIntroduction In the world of cybersecurity, visibility is key. Many potential vulnerabilities lie hidden behind unadvertised directories, files, or subdomains. Uncovering these hidden elements is crucial for a thorough security assessment. Enter Gobu...Discuss·10 likesgobuster
Kunal Jaglanblog.h00dy.me·Jun 30, 2024TryHackMe Publisher WriteUp | EasyLet's see what ports are open - nmap -sVC -T4 10.10.210.141 Nmap scan report for 10.10.210.141 Host is up (0.20s latency). Not shown: 998 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0...Discuss·73 readstryhackme
Reza RashidiforRedTeamReciperedteamrecipe.com·Jun 13, 2024Red Teaming with LLMsPractical Techniques for Attacking AI Systems: Red teaming with Large Language Models (LLMs) involves simulating adversarial attacks on AI systems to identify vulnerabilities and enhance their robustness. In this technical domain, offensive security ...Discuss·11 likes·1.7K readsredteaming
Reza RashidiforRedTeamReciperedteamrecipe.com·May 23, 2024macOS Red TeamingmacOS red teaming involves simulating cyber-attacks on macOS environments to identify vulnerabilities, assess security posture, and improve defensive measures. This process encompasses a wide array of techniques, tools, and methodologies aimed at mim...Discuss·3.7K readsmacOS
Reza RashidiforRedTeamReciperedteamrecipe.com·May 16, 2024system32 important filesThe System32 directory is a critical component of the Windows operating system, housing essential system files and libraries that are vital for the system’s operation. In the context of offensive security, this directory is significant because it con...Discuss·1 like·1.4K readssystem32
Ferdi birgülferdibirgul.hashnode.dev·Apr 25, 2024Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Ferdi BirgülLearn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black ...Discussredteaming
Reza RashidiforRedTeamReciperedteamrecipe.com·Apr 25, 2024ASLR Exploitation TechniquesAddress Space Layout Randomization (ASLR) is a security technique used in operating systems to protect against certain types of cyber attacks, particularly buffer overflow attacks. Here’s an overview of ASLR: What is ASLR? ASLR is a feature implement...Discuss·1.1K readsaslr
0xiNPro0xshin.hashnode.dev·Apr 21, 2024SQLi Series - Reading Files through SQL Injection - 08Introduction SQL Injection can be used for more than just gathering data from tables and databases It can also be leveraged to read and write files on the server In some cases, it can even lead to remote code execution on the back-end server Pri...Discuss·44 readspente