π Win a TryHackMe monthly subscription by writing a cybersecurity blog at - https://hacklido.com
π This is part of writer's reward program π€
π This is part of writer's reward program π€
β€2π₯2
π Is Quantum Resistant Cryptography Moving Fast Enough?
π https://hacklido.com/blog/839-is-quantum-resistant-cryptography-moving-fast-enough
π https://hacklido.com/blog/839-is-quantum-resistant-cryptography-moving-fast-enough
HACKLIDO
Is Quantum Resistant Cryptography Moving Fast Enough?
Weβre focused onβ¦ Whether quantum-resistant cryptography is developing fast enough to mitigate the crypto-cracking power of quantum computing. Why? Bec...
π§ CyberWeekly 15' June | Issue #3
[?!] The Mask APT, NTLM deprecation by Microsoft 2024, GitHub phishing & extorsions, JavaScript for hackers and more.
π https://hacklido.substack.com/p/cyberweekly-15-june-issue-3
[?!] The Mask APT, NTLM deprecation by Microsoft 2024, GitHub phishing & extorsions, JavaScript for hackers and more.
π https://hacklido.substack.com/p/cyberweekly-15-june-issue-3
β€1π₯1
π Dumping data from the Microsoft Recall folder
π https://hacklido.com/blog/840-dumping-data-from-the-microsoft-recall-folder
π https://hacklido.com/blog/840-dumping-data-from-the-microsoft-recall-folder
HACKLIDO
Dumping data from the Microsoft Recall folder
Recently, Microsoft announced their new AI Recall feature that will be enabled on a new hardware generation called Copilot+ PC. I wonβt bore you with the...
π1π€―1
π Gaining persistence on Windows with Time Providers
π https://hacklido.com/blog/841-gaining-persistence-on-windows-with-time-providers
π https://hacklido.com/blog/841-gaining-persistence-on-windows-with-time-providers
HACKLIDO
Gaining persistence on Windows with Time Providers
When authenticating into a Domain Controller using the Kerberos protocol, especially during a CTF, weβve all encountered the infamous Kerberos Clock Skew er...
π Why Mentoring Is Good For The Mentor
π https://hacklido.com/blog/842-why-mentoring-is-good-for-the-mentor
π https://hacklido.com/blog/842-why-mentoring-is-good-for-the-mentor
HACKLIDO
Why Mentoring Is Good For The Mentor
Weβre focused onβ¦ Why being a mentor has benefits not just for the mentee, but for the person doing the mentoring too. Why? Because we asked Paulino Ca...
π Continuous Security For Agility And Peace Of Mind
π https://hacklido.com/blog/843-continuous-security-for-agility-and-peace-of-mind
π https://hacklido.com/blog/843-continuous-security-for-agility-and-peace-of-mind
HACKLIDO
Continuous Security For Agility And Peace Of Mind
Weβre focused onβ¦ The importance of continuous security to help an organisation stay ahead of threats, act on vulnerabilities, and enable peace of mind fo...
π Embracing Web3 For The Future Of Cybersecurity
π https://hacklido.com/blog/803-embracing-web3-for-the-future-of-cybersecurity
π https://hacklido.com/blog/803-embracing-web3-for-the-future-of-cybersecurity
HACKLIDO
Embracing Web3 For The Future Of Cybersecurity
At Black Hat MEA 2023, Mohamed Samy (Senior Information Security Consultant at IOActive) introduced Project C-Shell β a unique infrastructure that integrat...
π How To Use VDPS To Launch Your Cybersecurity Career Path
π https://hacklido.com/blog/844-how-to-use-vdps-to-launch-your-cybersecurity-career-path
π https://hacklido.com/blog/844-how-to-use-vdps-to-launch-your-cybersecurity-career-path
HACKLIDO
How To Use VDPS To Launch Your Cybersecurity Career Path
Black Hat speaker Imran Parray (Founder and CEO at Snapsec) launched his career by reporting thousands of security vulnerabilities to companies via their s...
π Server-side Parameter Pollution (API Testing)
π https://hacklido.com/blog/848-server-side-parameter-pollution-api-testing
π https://hacklido.com/blog/848-server-side-parameter-pollution-api-testing
HACKLIDO
Server-side Parameter Pollution (API Testing)
Server-side parameter pollution Some systems contain internal APIs that arenβt directly accessible from the internet. Server-side parameter pollution occu...
π§ CyberWeekly 22' June | Issue #4
[?!] VDPS for career launch, LSASS decryption, Nmap port scanning. Anonymity with ProxyChains, TOR, Kali Linux, Kaspersky ban, major breaches, and cutting-edge tools.
π https://hacklido.substack.com/p/cyberweekly-22-june-issue-4
[?!] VDPS for career launch, LSASS decryption, Nmap port scanning. Anonymity with ProxyChains, TOR, Kali Linux, Kaspersky ban, major breaches, and cutting-edge tools.
π https://hacklido.substack.com/p/cyberweekly-22-june-issue-4
π1π₯1
π Reverse engineering LSASS to decrypt DPAPI keys
π https://hacklido.com/blog/849-reverse-engineering-lsass-to-decrypt-dpapi-keys
π https://hacklido.com/blog/849-reverse-engineering-lsass-to-decrypt-dpapi-keys
HACKLIDO
Reverse engineering LSASS to decrypt DPAPI keys
Before you start reading this post Iβd like to point out that this is not a practical technique, no sane person would manually hunt for DPAPI blobs and d...
π1
π USA Bans Kaspersky Lab - A Critical Move to Safeguard Cybersecurity
π https://hacklido.com/blog/850-usa-bans-kaspersky-lab-a-critical-move-to-safeguard-cybersecurity
π https://hacklido.com/blog/850-usa-bans-kaspersky-lab-a-critical-move-to-safeguard-cybersecurity
HACKLIDO
USA Bans Kaspersky Lab - A Critical Move to Safeguard Cybersecurity
In a decisive effort to protect national security and maintain the integrity of its information and communication technology infrastructure, the United Sta...
β€1
π Recent Supply Chain Cyberattacks and lessons learnt from that
π https://hacklido.com/blog/851-recent-supply-chain-cyberattacks-and-lessons-learnt-from-that
π https://hacklido.com/blog/851-recent-supply-chain-cyberattacks-and-lessons-learnt-from-that
HACKLIDO
Recent Supply Chain Cyberattacks and lessons learnt from that
Understanding Supply Chain Cyberattacks A supply chain cyberattack targets third-party vendors within an organizationβs supply chain. Historically, these a...
π How to Respond to Incident or Attacks & How not to screw up the crime scene
π https://hacklido.com/blog/852-how-to-respond-to-incident-or-attacks-how-not-to-screw-up-the-crime-scene
π https://hacklido.com/blog/852-how-to-respond-to-incident-or-attacks-how-not-to-screw-up-the-crime-scene
HACKLIDO
How to Respond to Incident or Attacks & How not to screw up the crime scene
βIf you canβt decipher our data, then why are you here?β This is a common reaction when our team arrives. Now, let me explain everything while covering:...
π₯1
π Reverse engineering of natively compiled .NET applications
π https://hacklido.com/blog/855-reverse-engineering-of-natively-compiled-net-applications
π https://hacklido.com/blog/855-reverse-engineering-of-natively-compiled-net-applications
HACKLIDO
Reverse engineering of natively compiled .NET applications
Explore the internals of applications built using native ahead-of-time (AOT) compilation. The .NET 7 platform debuted a new deployment model: forward nati...
π3
π Introduction to Secure Software Development Lifecycle (SSDLC)
π https://hacklido.com/blog/861-introduction-to-secure-software-development-lifecycle-ssdlc
π https://hacklido.com/blog/861-introduction-to-secure-software-development-lifecycle-ssdlc
HACKLIDO
Introduction to Secure Software Development Lifecycle (SSDLC)
Security should be integrated into every stage of the software development lifecycle. Description The traditional Software Development Lifecycle (SDLC) foll...
π1