Jul 12, 2022 | Articles, Write up
Security misconfigurations in Linux systems occur when necessary security controls are not properly implemented for servers or web apps. In this article, we’ll emphasize the importance of detecting and addressing misconfigurations through practical examples and tools like Nmap and the Metasploit Framework.
Jun 30, 2022 | Articles, Write up
In this article, we’ll explore the pervasive presence and potential risks associated with QR codes in daily life. We’ll discuss the ease with which malicious QR codes can be created, either manually or through specialized tools, allowing attackers to embed harmful payloads. A tutorial its included, emphasizing its role in creating various types of malicious QR codes for security testing purposes.
May 30, 2022 | Hacking Stories
Kevin Poulsen, aka Dark Dante, and his hacking activities on ARPANET’s networks Post Views: 193 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 8 Minutes Introduction Kevin Poulsen, aka Dark Dante, hacked ARPANET’s network, dig deep...
May 27, 2022 | Information Security
The Difference between Vulnerability Assessment and Pentesting Post Views: 243 Reading Time: 4 Minutes Introduction In this article, we will explain the difference between Vulnerability Assessment and Penetration testing. Cyber-crime shows no signs of slowing down,...
May 5, 2022 | Articles, Write up
In this article, we’ll demonstrate red team tactics for uncovering hidden secrets on websites. Despite security layers that companies deploy, such as Cloudflare WAF and next-generation firewalls, attackers can exploit sensitive information embedded in code, such as API keys and tokens.
Apr 29, 2022 | Hacking Stories, Malware
Darkside hacker group, the group that provides ransomware as a service Post Views: 303 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 6 Minutes Introduction DarkSide hacker group provides ransomware as a service, and it is believed to be...