π Accelerating Your Bug Bounty Game with Nuclei: Tips and Tricks
π https://hacklido.com/blog/376-accelerating-your-bug-bounty-game-with-nuclei-tips-and-tricks
π https://hacklido.com/blog/376-accelerating-your-bug-bounty-game-with-nuclei-tips-and-tricks
HACKLIDO
Accelerating Your Bug Bounty Game with Nuclei: Tips and Tricks
Hello guys, itβs me @dheerajydv19 , and in todayβs blog, we will be learning about a customizable vulnerability scanner, βNucleiβ, created by ProjectDiscov...
π1
π How I leveraged Open Redirect to Get Account Takeover
π https://hacklido.com/blog/377-how-i-leveraged-open-redirect-to-get-account-takeover
π https://hacklido.com/blog/377-how-i-leveraged-open-redirect-to-get-account-takeover
HACKLIDO
How I leveraged Open Redirect to Get Account Takeover
Summary An account takeover bug is a type of vulnerability that can be exploited by attackers to gain unauthorized access to user accounts on a system or...
β€1
π Firmware extraction from SPI flash
π https://hacklido.com/blog/379-firmware-extraction-from-spi-flash
π https://hacklido.com/blog/379-firmware-extraction-from-spi-flash
HACKLIDO
Firmware extraction from SPI flash
Hello, readers Itβs been a while since I wrote a blog, from now on I try to post regularly on whatever stuff is interesting to me. The reason behind this b...
π2
π Introduction to Forensic Data Carving
π https://hacklido.com/blog/383-introduction-to-forensic-data-carving
π https://hacklido.com/blog/383-introduction-to-forensic-data-carving
HACKLIDO
Introduction to Forensic Data Carving
Greetings amazing readers! Last time I made an interactive guide demonstrating forensic imaging and how to acquire digital evidence from devices. Continui...
π Memory Forensics with Volatility Framework - Introductory Guide
π https://hacklido.com/blog/384-memory-forensics-with-volatility-framework-introductory-guide
π https://hacklido.com/blog/384-memory-forensics-with-volatility-framework-introductory-guide
HACKLIDO
Memory Forensics with Volatility Framework - Introductory Guide
Greetings amazing readers and welcome to a fresh blog. In the past week, I had written many articles on digital forensics and I am back with another fo...
π CVE-2023-23525: Get Root via A Fake Installer
π https://hacklido.com/blog/385-cve-2023-23525-get-root-via-a-fake-installer
π https://hacklido.com/blog/385-cve-2023-23525-get-root-via-a-fake-installer
HACKLIDO
CVE-2023-23525: Get Root via A Fake Installer
In this post, I want to share a simple LPE vulnerability associated with it and why Apple made the change.Also Visit On Our Website https://system32.ink For...
π Security Challenges in Cloud Computing
π https://hacklido.com/blog/386-security-challenges-in-cloud-computing
π https://hacklido.com/blog/386-security-challenges-in-cloud-computing
HACKLIDO
Security Challenges in Cloud Computing
Cloud computing has revolutionized the way businesses store and manage their data. With its scalability, cost-effectiveness, and accessibility, cloud compu...
π Lessons Learned From Years of Red Teaming in Cybersecurity
π https://hacklido.com/blog/387-lessons-learned-from-years-of-red-teaming-in-cybersecurity
π https://hacklido.com/blog/387-lessons-learned-from-years-of-red-teaming-in-cybersecurity
HACKLIDO
Lessons Learned From Years of Red Teaming in Cybersecurity
Lessons Learned From Years of Red Teaming in Cybersecurity Red teaming can mean a lot of things to a lot of people. In its truest sense, and how I will d...
π Blue Teaming Bootcamp Series
π Part 1: https://hacklido.com/blog/293-blue-team-bootcamp-series-p1-how-to-detect-brute-force-attacks
π Part 2: https://hacklido.com/blog/302-blue-team-bootcamp-series-p2-how-to-detect-sql-injection-attacks
π Part 3: https://hacklido.com/blog/321-blue-team-bootcamp-series-p3-how-to-detect-cross-site-scripting-xss-attacks
π Part 1: https://hacklido.com/blog/293-blue-team-bootcamp-series-p1-how-to-detect-brute-force-attacks
π Part 2: https://hacklido.com/blog/302-blue-team-bootcamp-series-p2-how-to-detect-sql-injection-attacks
π Part 3: https://hacklido.com/blog/321-blue-team-bootcamp-series-p3-how-to-detect-cross-site-scripting-xss-attacks
π3β€1
π Git Arbitrary Configuration Injection (CVE-2023-29007)
π https://hacklido.com/blog/388-git-arbitrary-configuration-injection-cve-2023-29007
π https://hacklido.com/blog/388-git-arbitrary-configuration-injection-cve-2023-29007
HACKLIDO
Git Arbitrary Configuration Injection (CVE-2023-29007)
Gitβs implementation used to rename or delete sections of a configuration file contained a logic error that resulted in improperly treating configuration v...
π1
π Brief History on the evolution of Malware
π https://hacklido.com/blog/389-brief-history-on-the-evolution-of-malware
π https://hacklido.com/blog/389-brief-history-on-the-evolution-of-malware
HACKLIDO
Brief History on the Evolution of Malware
A βcomputer virusβ is one of the few transcendent technical terms everyone understands, including children. Regardless of socioeconomic background or age,...
π1
π Privileges Escalation Techniques (Basic to Advanced) for Windows - (Part-2)
π https://hacklido.com/blog/390-privileges-escalation-techniques-basic-to-advanced-for-windows-part-2
π https://hacklido.com/blog/390-privileges-escalation-techniques-basic-to-advanced-for-windows-part-2
HACKLIDO
Privileges Escalation Techniques (Basic to Advanced) for Windows - (Part-2)
Hello Friend. Welcome back to a new part of this series. One month or more has elapsed since part 1 came. Took a long break I guess π Check out the first p...
π Demystifying Cloud Security: Safeguarding Your Data in the Digital Age
π https://hacklido.com/blog/393-demystifying-cloud-security-safeguarding-your-data-in-the-digital-age
π https://hacklido.com/blog/393-demystifying-cloud-security-safeguarding-your-data-in-the-digital-age
HACKLIDO
Demystifying Cloud Security: Safeguarding Your Data in the Digital Age
Cloud computing has become an essential component of our digital landscape as technology advances at a phenomenal rate. Cloud services are a popular option...
β€1π1
Want to level up your bug bounty Recon skills? Look no further!
Watch the insightful webinar hosted by Hacklido with Y0gisec as our guest speaker.
Youtube:- https://youtu.be/eK4jDaXGGhk
- Learn essential techniques like subdomain enumeration and broaden your scope. But wait, there's more!
- Discover advanced techniques like Shodan, GitHub, fuzzing, Google dork, and JS recon.
Watch now to level up your game! #Hacklido
Watch the insightful webinar hosted by Hacklido with Y0gisec as our guest speaker.
Youtube:- https://youtu.be/eK4jDaXGGhk
- Learn essential techniques like subdomain enumeration and broaden your scope. But wait, there's more!
- Discover advanced techniques like Shodan, GitHub, fuzzing, Google dork, and JS recon.
Watch now to level up your game! #Hacklido
β€2
π Stanford | CS 253 Web Security Course reference
π https://hacklido.com/blog/394-stanford-cs-253-web-security-course-reference
π https://hacklido.com/blog/394-stanford-cs-253-web-security-course-reference
HACKLIDO
Stanford | CS 253 Web Security Course reference
This course is a comprehensive overview of web security. The goal is to build an understanding of the most common web attacks and their countermeasures. Gi...