REHAN SAYYEDdignitas.hashnode.dev·Nov 20, 2024HackMyVM - RunasLet’s Import our machine into the VM and boot it up. We see that we have a Windows 7 machine with 2 users Administrator and runas. We don’t have any access to any user or something. So, moving back to our Kali machine. First, let’s discover what our...DiscussWeb Exploitation
pan30pan8a2.hashnode.dev·Sep 5, 2024Photo Gallery - Hacker101 Write UpFlag 0 ở chall này cho mình một trang web như sau, đầu tiên nhìn vào mình không thấy bất kỳ đầu vào nào nên mình kiểm tra src code của nó có một số 3 endpoint ở thuộc tính src và khi mình click vào thử thì đầu ra như sau do chưa có thông tin gì nê...DiscussCTF Writeup
The Raw Bitblog.sudarshandevkota.com.np·Aug 5, 2024Overthewire Natas Walkthrough for BeginnersLevel 0 - Level 1: Looking at the source of the page, it has the password for the next level. 🔒 g9D9cREhslqBKtcA2uocGHPfMZVzeFK6 Level 1 - Level 2: The level was blocking right click but not the keyboard shortcut. Viewing the html gives the...Discuss·60 readsnatas
Sm1l3xsmilex.hashnode.dev·Feb 22, 2024Some Assembly Required 1Let's ask the Big G about WebAssembly Let's inspect the source code http://mercury.picoctf.net:26318/index.html Let' see what is in the JIFxzHyW8W file http://mercury.picoctf.net:26318/JIFxzHyW8W flag:picoCTF{8857462f9e30faae4d037e5e25fee1ce} If...Discuss·10 likesWeb Exploitation
SAMEER TRIPATHIsamtripathi.hashnode.dev·Dec 9, 2023Decrypting the Web: The T0P Enigmatic 200 Google Dorks Commands UnveiledGet ready to dive into the mysterious depths of the internet's enigma, where Google Dorks reign supreme. Beyond the familiar search bar, a world of untold possibilities awaits discovery. Picture having the power to unearth hidden gems, reveal sensiti...Discuss·4 likes·245 readsWeb Vulnerabilities
Nisarga Adhikaryni5arga.hashnode.dev·Oct 8, 2023How I hacked an ARG/Cryptic Hunt siteA friend of mine was organizing an ARG/Cryptic Hunt competition for his school's techfest/competition. He built the site/platform where the competition was being hosted all by himself. But it was buggy, really buggy and had a lot of vulnerabilities. ...Discuss·1 like·180 reads#cybersecurity
Daniyardonnoway.hashnode.dev·Aug 11, 2023HackTheBox - MetaTwoEnumeration I will begin by scanning the host for any open ports. Usually, it’s done by Nmap or masscan, but I will use threader3000(clickable link) It just scans ports very fast, and then puts open ports to Nmap detailed scan(-sC for default scrip...DiscussHackTheBox#HackTheBox
Shreya Shreeshreyashree.hashnode.dev·Jul 16, 2023My Digital Defenders Cybersecurity CTF 2023 WriteupIn this first-ever blog post, I will be sharing the writeups for some of the flags that I found as a part of the Capture the Flag (CTF) competition 2023 organized by CISCO x CNI IISC x Traboda x bi0s. I had a fun time solving these challenges. For t...Discuss·1 like·86 readsWeb Exploitation
Nouman Rahmanprogrammingfire.hashnode.dev·Dec 18, 2022Top 5 Common Web Application VulnerabilitiesWeb application attacks are involved in 26% of all breaches, and app security is a concern for enterprises. The size of a startup does not exempt it from cyber-attacks – that's because hackers constantly scan the internet looking for flaws. It takes ...Discuss·10 likes·568 readsWeb Development
World of HackerforHack, Build & Scale - Web & Server appsworldofhacker.com·Nov 25, 2010XSS tunneling - WorldOfHacker - 2011XSS tunneling [Complete Series] (migrated from the worldofhacker forum - 2011) In This thread, we talk about in-depth descriptions of XSS tunneling. Source:- Internet & Few Security team Books. INDEX 1). XSS Tunnelling What Is An XSS Tunnel? What Is...Discuss·1 like·77 readscross site scripting