Sm1l3xsmilex.hashnode.dev·Feb 22, 2024Some Assembly Required 1Let's ask the Big G about WebAssembly Let's inspect the source code http://mercury.picoctf.net:26318/index.html Let' see what is in the JIFxzHyW8W file http://mercury.picoctf.net:26318/JIFxzHyW8W flag:picoCTF{8857462f9e30faae4d037e5e25fee1ce} If...Discuss·10 likesWeb Exploitation
SAMEER TRIPATHIsamtripathi.hashnode.dev·Dec 9, 2023Decrypting the Web: The T0P Enigmatic 200 Google Dorks Commands UnveiledGet ready to dive into the mysterious depths of the internet's enigma, where Google Dorks reign supreme. Beyond the familiar search bar, a world of untold possibilities awaits discovery. Picture having the power to unearth hidden gems, reveal sensiti...Discuss·4 likes·146 readsWeb Vulnerabilities
Nisarga Adhikaryblog.nisarga.me·Oct 8, 2023How I hacked an ARG/Cryptic Hunt siteA friend of mine was organizing an ARG/Cryptic Hunt competition for his school's techfest/competition. He built the site/platform where the competition was being hosted all by himself. But it was buggy, really buggy and had a lot of vulnerabilities. ...Discuss·1 like·159 reads#cybersecurity
Daniyardonnoway.hashnode.dev·Aug 11, 2023HackTheBox - MetaTwoEnumeration I will begin by scanning the host for any open ports. Usually, it’s done by Nmap or masscan, but I will use threader3000(clickable link) It just scans ports very fast, and then puts open ports to Nmap detailed scan(-sC for default scrip...DiscussHackTheBox#HackTheBox
Shreya Shreeshreyashree.hashnode.dev·Jul 16, 2023My Digital Defenders Cybersecurity CTF 2023 WriteupIn this first-ever blog post, I will be sharing the writeups for some of the flags that I found as a part of the Capture the Flag (CTF) competition 2023 organized by CISCO x CNI IISC x Traboda x bi0s. I had a fun time solving these challenges. For t...Discuss·1 like·68 readsWeb Exploitation
Nouman Rahmanprogrammingfire.hashnode.dev·Dec 18, 2022Top 5 Common Web Application VulnerabilitiesWeb application attacks are involved in 26% of all breaches, and app security is a concern for enterprises. The size of a startup does not exempt it from cyber-attacks – that's because hackers constantly scan the internet looking for flaws. It takes ...Discuss·10 likes·568 readsWeb Development
World of HackerforHack, Build & Scale - Web & Server appsworldofhacker.com·Nov 25, 2010XSS tunneling - WorldOfHacker - 2011XSS tunneling [Complete Series] (migrated from the worldofhacker forum - 2011) In This thread, we talk about in-depth descriptions of XSS tunneling. Source:- Internet & Few Security team Books. INDEX 1). XSS Tunnelling What Is An XSS Tunnel? What Is...Discuss·1 like·67 readscross site scripting