Sep 1, 2025 · 9 min read · ¿Alguna vez te has preguntado qué se esconde detrás de una página web? 🤔 En el apasionante mundo de la ciberseguridad, una de las primeras habilidades que todo hacker ético debe dominar es el fuzzing. Imagina que eres un explorador buscando tesoros ...
Join discussion
Aug 14, 2025 · 10 min read · Recap Awesome! I see you’re back! Part 3 was a banger with some good old testing fundamentals. We wrote a pretty simple bank contract through which users could deposit and withdraw funds, as well as check their balances. Deployed the same using anvil...
Join discussion
Jul 21, 2025 · 3 min read · Scenario To complete the skills assessment, answer the questions below. You will need to apply a variety of skills learned in this module, including: Using whois Analysing robots.txt Performing subdomain bruteforcing Crawling and analysing result...
Join discussion
Jul 16, 2025 · 5 min read · Scenario You are given an online academy's IP address but have no further information about their website. As the first step of conducting a Penetration Test, you are expected to locate all pages and domains linked to their IP to enumerate the IP and...
Join discussion
Jul 4, 2025 · 21 min read · Brief Recap of Liquity v2 governance contract Before jumping into fuzzing suite, let’s briefly recap how Liquity v2’s governance contract works. Liquity v2 is a decentralized protocol where users can borrow BOLD (a USD-pegged stablecoin) by depositin...
Join discussion
Jul 3, 2025 · 14 min read · Who is this article for This article is for those studying the next piece about fuzzing this contract, and it's also useful for anyone wanting to understand the governance system and how Liquity V2 governance works. Liquity V2 Overview Before diving ...
BTharun commented
Feb 7, 2025 · 6 min read · Parameter fuzzing is the process of discovering hidden, undocumented, or vulnerable parameters in web applications by sending a large number of test requests. It is an essential technique in web application security testing, bug bounty hunting, and p...
Join discussion
Feb 7, 2025 · 6 min read · Directory Fuzzing As we can see from the example above, the main two options are -w for wordlists and -u for the URL. We can assign a wordlist to a keyword to refer to it where we want to fuzz. For example, we can pick our wordlist and assign the key...
Join discussion
Jan 7, 2025 · 6 min read · Subdomains are an essential part of a website’s infrastructure. They provide additional functions in a web application, such as APIs, admin portals, and staging environments. As an ethical hacker, discovering subdomains is a critical step in learning...
Join discussion