Emmanuel Osokoforthe hack blogsoksonjr.hashnode.net·Oct 12, 2022The Hacker's MethodologyOne of the things that fascinated me a lot when I was much younger was the idea of hacking into a system. I had no idea what networking, Ip addresses, ports or anything of that nature meant. As such, it did not make sense to me that you could just co...Discuss·2 likes·195 reads#cybersecurity
Hashar MujahidforHax-13 Heraldhasharmujahid.hashnode.net·Mar 18, 2023JWT (JSON WEB TOKENS) [Explained | Exploited][Part]Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. In this blog, we are going to learn about what are JWTs (JSON Web Tokens) and how we can exploit them. We will also see some advanced techniques to exploit JWTs. Let...Discuss·1 like·45 reads#cybersecurity
Piyush PradhanforMediocre Blogmediocre314.hashnode.net·Apr 16, 2022Cloud security with flaws.cloudIn the past week, I’ve been spending my time playing around with cloud services, deploying random stuff just to try and figure out how it’s being used. I also wanted to have a vulnerable environment to try and extract something that isn’t usually mad...DiscussBlogsWithCC
HanforEunhan's blogeunhanlee.hashnode.net·Apr 12, 2023Understanding the Key Features of Burp SuiteBurp Suite Definition Burp Suite is a web proxy program (packet manipulation program) that sits between the client and the server. It allows interception of data being sent between the two and provides various tools such as vulnerability scanners and...DiscussProgrammingWeb Security
The Chief - OmarforA Technical Writing Journeychiefomar.hashnode.net·Mar 27, 2023Burp Suite-s meBismillah In today's work, I learned how to use the various Burp Suite Tools. What is Burp Suite? Burp suite is a software platform that contains multiple tools that are helpful in vulnerability scanning, penetration testing, understanding, and secur...Discusspentesting
The Chief - OmarforA Technical Writing Journeychiefomar.hashnode.net·Mar 22, 2023Bringing Life to The Laptop: Kali Linux SetupBismillah Greetings again, chiefomar here. So yesterday and today were a bit interesting; First Day of Sc..o(de): Decisions Yesterday I had a great time installing Kali Linux onto my computer and choosing between Junior pen-testing and Junior SOC an...Discuss·26 readspenetration testing
The Chief - OmarforA Technical Writing Journeychiefomar.hashnode.net·Mar 21, 2023Decisions, Decisions: Jr. Pentester vs. Jr. Security Analyst?Bismillah More often than not, we arrive at crossroads and are faced with a choice to make. In a grocery store, do we pick coconut oil or vegetable oil? Do we go for the latest Mercedes Benz or the latest BMW in a car yard? And for me in cyber securi...Discusspentesting
Hashar MujahidforHax-13 Heraldhasharmujahid.hashnode.net·Mar 18, 2023JWT (JSON WEB TOKENS) [Explained | Exploited][Part]Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. In this blog, we are going to learn about what are JWTs (JSON Web Tokens) and how we can exploit them. We will also see some advanced techniques to exploit JWTs. Let...Discuss·1 like·45 reads#cybersecurity
La Rebelion LabsforLa Rebelionla-rebelion.hashnode.net·Mar 18, 2023Kubernetes Security: The Ultimate Guide to Penetration Testing and Best Practices for Securing Your ClusterWhen it comes to securing your Kubernetes cluster, there are several best practices that you should implement to protect your applications and data from potential threats. In this blog post, we will discuss three key areas to focus on when securing y...Discuss·32 readsSecurity
Abdul HakimforNubesec's Communitynubesec.hashnode.net·Feb 25, 2023PenTest IntroductionWhat is PenTest? PenTest is the acronym for "Penetration Testing" or a kind of activity that conducts to identify any security weakness and vulnerabilities that may exist in our network or system. There are many ways to perform Penetration Testing in...Discuss·27 readsPentest
Pradeep BhattaraiforPradeep Bhattarai's Blogpr0d33p.hashnode.net·Feb 9, 2023Maximizing Penetration Testing Efforts with ShodanIntroduction Penetration testing is an essential part of cybersecurity, helping organizations identify and address potential security vulnerabilities before they can be exploited by malicious actors. With the increasing number of connected devices an...Discusspentesting
andhika pratama putraforandhika pratama putraandhikapratamap.hashnode.net·Feb 6, 2023Web ExploitPICO CTF WRITEUP LOGIN Web Exploit adalah suatu teknik untuk menghack atau menerobos masuk suatu website atau situs online menggunakan beberapa teknik. Hacking tanpa izin adalah ilegal. Situs ini sangat mendidik untuk mempelajari tentang keamanan du...Discuss·30 readsHackingCTF
Green MethodforGreen Method Blog'sgreenmethod.hashnode.net·Dec 5, 2022What is Vulnerability Assessment & Penetration TestingVulnerability Assessment and Penetration Testing (VAPT) are essential tools used in the cybersecurity field. While they both serve the same purpose of identifying network vulnerabilities, they are two separate processes. Each process has its strength...Discussvulnerability