Zealynx Securityzealynx.hashnode.dev·Apr 17, 2024The Critical Role of Fuzzing in Blockchain SecurityIn this article, we will dive into the fascinating realm of fuzzing. To understand it and before setting up our tests in Foundry we will learn what is the core concept of fuzzing. What is fuzzing? Fuzzing, or fuzz testing, is a technique where invali...Discuss·32 readsSmart Contracts
Shikhor Kumer Royshikhorroy.hashnode.dev·Apr 14, 2024HTTPS [EP 02] — How to Generate a Certificate?We already know that a certificate that contains a public key (PUB-K1) is sent in STEP 2 from the LinkedIn server to the client. Today we will open the Blackbox that how this certificate is generated for the LinkedIn server. How a Certificate is Sign...DiscussAPI Basicshttps
Shikhor Kumer Royshikhorroy.hashnode.dev·Apr 14, 2024HTTPS [EP 01] — How It Works?Have you ever wondered, what it means by Connection is secure — shown on your browser? Fig: Proof of: LinkedIn uses HTTPS 😋 Ummm…you may think by yourself, Yes I know it! It is HTTPS, a secure hypertext transfer protocol that is being used here! Bu...DiscussAPI Basicshttps
Niccolo Lampathedatalife.com·Apr 11, 2024picoCTF - Cookies SolutionCookies Solution This is the solution for picoCTF's Cookies challenge web exploitation problem. This problem was taken from the picoCTF 2021 and the solution will be discussed below. So proceed with caution. Clicking on the link we are redirected to...DiscussWeb Security
Jessica Meroneyjrcmarketingsolution.hashnode.dev·Mar 1, 2024From Reactive to Proactive The Shift in Web Security Strategy for 2024Introduction Nowadays, we depend a lot on businesses and services that are either completely digital or use digital tools. Business leaders often wonder if having a website is really necessary and if their website is safe for transactions. As more bu...Discusswebsecurity
El Hadramy Cheiguercheigro.hashnode.dev·Feb 15, 2024Cross Site Scripting (XSS)Cross Site Scripting: Attack occurs when application takes untrusted data and sends it to a web browser without proper validation or sanitization Search Example: https://google.com/search?q=<search term > https://google.com/search?q=<search term > <h...DiscussXSS
dhatrishdhatrish.hashnode.dev·Jan 18, 2024Authentication using Refresh Token and Access TokenImagine stepping into the digital world as easily and securely as you enter your home. This is what token-based authentication in web development offers. In this article, we'll demystify how websites keep your digital identity safe and seamless. The ...Discuss·3 likes·88 readsWeb Security
Lalit Narayan Mishralalitmishratechblog.hashnode.dev·Nov 4, 2023Understanding OAuth 2.0: The Backbone of Modern Web SecurityIn the modern era of interconnected web services and applications, security and privacy are of paramount importance. OAuth 2.0 stands as a cornerstone technology that enables secure and convenient access control. This open standard for access delegat...Discuss·132 readsOAuth2
Fabrice Innocentfabricewrites.hashnode.dev·Oct 18, 2023A Beginner's Guide to Spotting Phishing Emails: Protecting Your Computer and DataIn today's digital age, email is an integral part of our lives. It's a convenient way to communicate, but it can also be a breeding ground for cybercriminals who use phishing emails to compromise your computer and steal your sensitive information. If...Discuss#PhishingAttacks
Kevin TauchmanforKevBot's Security Blogkevbotsec.hashnode.dev·Aug 25, 2023Demystifying OWASP Top 10Introduction In the ever-evolving landscape of web applications, security remains a paramount concern. As businesses and services migrate online, the potential attack surface for malicious actors also increases. The Open Web Application Security Proj...DiscussOWASP TOP 10