REHAN SAYYEDdignitas.hashnode.dev·Nov 20, 2024HackMyVM - RunasLet’s Import our machine into the VM and boot it up. We see that we have a Windows 7 machine with 2 users Administrator and runas. We don’t have any access to any user or something. So, moving back to our Kali machine. First, let’s discover what our...DiscussWeb Exploitation
Anuj Singh Chauhananujcybersec.hashnode.dev·Nov 9, 2024Title: Enhancing Reverse Shell Interactivity with Python's pty ModuleIn the world of cybersecurity, reverse shells play a crucial role in penetration testing, allowing security professionals to interact with remote systems from a compromised session. But, a raw reverse shell often lacks the interactivity needed for ef...Discusspenetration testing
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Sep 17, 2024LFI and RFI: A Deep Dive with Real-World ExamplesLFI (Local File Inclusion) and RFI (Remote File Inclusion) are two common web application vulnerabilities that allow attackers to include files on the server, potentially leading to unauthorized access, code execution, or data disclosure. LFI (Local ...Discuss·75 readsFortify and Defend: Navigating the Cybersecurity Landscapecode security
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Aug 7, 2024OWASP Top 10: A Deep Dive into Web Application SecurityThe Open Web Application Security Project (OWASP) is a non-profit foundation dedicated to improving software security. One of its most influential initiatives is the OWASP Top 10, a regularly updated report outlining the most critical security risks ...DiscussFortify and Defend: Navigating the Cybersecurity LandscapeWeb Security
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 20, 2023Basic pen-testing vulnhub machine 2 HackingBy Prabhudarshan Samal This article is about a well-illustrated write-up based on hacking activities in an educational temperament and non-abusive intent. The techniques and resources provided by the article are totally intended for educational purpo...Discusspentesting
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 17, 2023Cross-site scripting(XSS) RemediationApplications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the victim user. Execute every action that the user is capable of. Read any data that the user has permissio...DiscussWAPT
Ashutosh Wahaneblog.ashutoshwahane.dev·Oct 1, 2023Shielding Your Android AppHi Guys! Do you recall learning in biology class about cells being the fundamental unit of life, with both structural and functional properties? Well, in today's world, mobile phones have become just as essential and fundamental to our daily lives. H...Discuss·4 likes·208 readsAndroid
BinFin Techbinfintech.hashnode.dev·Sep 22, 2023Introduction to Computer Networking1) What is computer networking? Computer Networking is referred to as the process of connecting various computing systems and devices so they may communicate with one another. 2) What are the different types of connections in computer networks? A) Co...Discussethicalhacking
RSK Cyber Securityrskcybersecurity.hashnode.dev·Nov 18, 20225 Best VAPT Tools – Vulnerability Assessment and Penetration TestingVAPT (Vulnerability Assessment and Penetration) Testing still stands as the most effective and efficient cybersecurity measure to fortify your security posture. You can eliminate security risks by identifying the vulnerabilities present within your w...Discuss·36 readsvapt