๐ฎ We are launching our upcoming Bi-Monthly Newsletters (and possibly in future a weekly newsletter) on Substack for better and convenient delivery while ensuring at most quality in the issues published. You can expect one issue in next 5-8 hrs!
๐จ Subscribe to it now with any email of your choice. We Won't flood your inbox with ads, As at hacklido, we carry the no-ads policy. Make sure to subscribe! https://hacklido.substack.com
๐ค We are indeed open for sponsorships, reach out to our discord for that.
๐จ Subscribe to it now with any email of your choice. We Won't flood your inbox with ads, As at hacklido, we carry the no-ads policy. Make sure to subscribe! https://hacklido.substack.com
๐ค We are indeed open for sponsorships, reach out to our discord for that.
โค2
Hacklido's Bi-Monthly Newsletter's First version is up on Substack!
Make sure to subscribe for awesome Newsletter content.
https://hacklido.substack.com/p/cyber-security-round-up-may-31st
Make sure to subscribe for awesome Newsletter content.
https://hacklido.substack.com/p/cyber-security-round-up-may-31st
Substack
Cyber Security Round Up - May 31st, 23
We make sure to keep you updated with the latest Infosec trends around the globe.
๐1
๐ How I was able to buy free Red Bull | Parameter Tampering
๐ https://hacklido.com/blog/458-how-i-was-able-to-buy-free-red-bull-parameter-tampering
๐ https://hacklido.com/blog/458-how-i-was-able-to-buy-free-red-bull-parameter-tampering
HACKLIDO
How i was able to buy free Red Bull | Parameter Tampering
Introduction: Android has become the industry standard platform for mobile apps, offering a wide range of features and functionalities. The need to fix po...
๐ Understanding Broken Authentication in OWASP API2: A Comprehensive Guide | 2023
๐ https://hacklido.com/blog/461-understanding-broken-authentication-in-owasp-api2-a-comprehensive-guide-2023
๐ https://hacklido.com/blog/461-understanding-broken-authentication-in-owasp-api2-a-comprehensive-guide-2023
HACKLIDO
Understanding Broken Authentication in OWASP API2: A Comprehensive Guide | 2023
Exploring the Working Principle, Exploitation Techniques, and Prevention Measures of Broken Authentication in OWASP API2 | Karthikeyan Nagaraj Introductio...
๐ Pentesterโs Guide to Performing File Transfers
๐ https://hacklido.com/blog/460-pentesters-guide-to-performing-file-transfers
๐ https://hacklido.com/blog/460-pentesters-guide-to-performing-file-transfers
๐ A Comparative Analysis of Vulnerability Assessment, Penetration Testing, and Red Team Engagement
๐ https://hacklido.com/blog/462-a-comparative-analysis-of-vulnerability-assessment-penetration-testing-and-red-team-engagement
๐ https://hacklido.com/blog/462-a-comparative-analysis-of-vulnerability-assessment-penetration-testing-and-red-team-engagement
๐1๐ฅ1
๐ The Ultimate Guide to Port Scanning using Nmap | Nmap Notes
๐ https://hacklido.com/blog/464-the-ultimate-guide-to-port-scanning-using-nmap-nmap-notes
๐ https://hacklido.com/blog/464-the-ultimate-guide-to-port-scanning-using-nmap-nmap-notes
๐2
๐ Understanding CAN Bus Packet Manipulation Techniques for Automotive Hacking
๐ https://hacklido.com/blog/466-understanding-can-bus-packet-manipulation-techniques-for-automotive-hacking
๐ https://hacklido.com/blog/466-understanding-can-bus-packet-manipulation-techniques-for-automotive-hacking
HACKLIDO
Understanding CAN Bus Packet Manipulation Techniques for Automotive Hacking
Exploiting weaknesses in a carโs electronic systems to gain unauthorized access or control is known as โautomotive hacking.โ The potential attack surface...
๐ฅ1
๐ Featuring Top Cloud Security Blog articles! @hacklido
1. Top cloud security threats and how to mitigate them
2. The impact of cloud computing on cybersecurity
3. How I Found AWS API Keys using โTrufflehogโ and Validated them using โenumerate-iamโ tool
4. Security Challenges in Cloud Computing
5. Demystifying Cloud Security: Safeguarding Your Data in the Digital Age
6. Learn about Incident Response and Digital Forensic Investigation in cybersecurity
โก๏ธ Write yours at hacklido.com today!
1. Top cloud security threats and how to mitigate them
2. The impact of cloud computing on cybersecurity
3. How I Found AWS API Keys using โTrufflehogโ and Validated them using โenumerate-iamโ tool
4. Security Challenges in Cloud Computing
5. Demystifying Cloud Security: Safeguarding Your Data in the Digital Age
6. Learn about Incident Response and Digital Forensic Investigation in cybersecurity
โก๏ธ Write yours at hacklido.com today!
๐คฉ2โค1๐1
๐ Unlocking the Power of Linux: Basic Commands and Hacker's Toolkit! ๐
๐ https://hacklido.com/blog/467-unlocking-the-power-of-linux-basic-commands-and-hackers-toolkit
๐ https://hacklido.com/blog/467-unlocking-the-power-of-linux-basic-commands-and-hackers-toolkit
HACKLIDO
๐ป๐ง Unlocking the Power of Linux: Basic Commands and Hacker's Toolkit! ๐
Looking to level up your Linux skills? ๐ค๐ Check out this comprehensive guide to basic Linux commands that every aspiring hacker should know! From file mana...
๐ Analyzing VoIP Traffic with Wireshark
๐ https://hacklido.com/blog/469-analyzing-voip-traffic-with-wireshark
๐ https://hacklido.com/blog/469-analyzing-voip-traffic-with-wireshark
HACKLIDO
Analyzing VoIP Traffic with Wireshark
Analyzing VoIP Traffic with Wireshark: Unveiling Insights for Enhanced Communication Security Introduction: VoIP (Voice over Internet Protocol) has revolu...
๐ Basic yet effective roadmap for becoming a security researcher for free and earning a living
๐ https://hacklido.com/blog/470-basic-yet-effective-roadmap-for-becoming-a-security-researcher-for-free-and-earning-a-living
๐ https://hacklido.com/blog/470-basic-yet-effective-roadmap-for-becoming-a-security-researcher-for-free-and-earning-a-living
HACKLIDO
Basic yet effective roadmap for becoming a security researcher for free and earning a living
One of the hardest parts about learning anything on your own is not learning it, itโs learning how to learn it well. Iโll be sharing three general steps...
๐ Begin your cloud security journey: Solving Flaws.cloud Part-1
๐ https://hacklido.com/blog/472-begin-your-cloud-security-journey-solving-flawscloud-part-1
๐ https://hacklido.com/blog/472-begin-your-cloud-security-journey-solving-flawscloud-part-1
HACKLIDO
Begin your cloud security journey: Solving Flaws.cloud Part-1
The entire blog contains all the challenges solved by me, I solved these challenges to learn cloud security as part of my Intern tasks @Appsecco. I would l...
โค1๐ฅ1
๐ Analysis of Malicous APK using MobSF (Part 1)
๐ https://hacklido.com/blog/473-analysis-of-malicous-apk-using-mobsf-part-1
๐ https://hacklido.com/blog/473-analysis-of-malicous-apk-using-mobsf-part-1
HACKLIDO
Analysis of Malicous APK using MobSF (Part 1)
Analysis of Malicous APK using MobSF (Part 1) What is APK: APK files are a sort of zip or package that include resource files and.dex files. Apk files can...
๐1๐1
๐ Linux for hackers - Part #2 | Linux Process and Storage Management
๐ https://hacklido.com/blog/474-linux-for-hackers-part-2-linux-process-and-storage-management
๐ https://hacklido.com/blog/474-linux-for-hackers-part-2-linux-process-and-storage-management
HACKLIDO
Linux for hackers - Part #2 | Linux Process and Storage Management
โฅ Introduction Welcome back to the second installment of our blog series, โLinux for Hackers.โ And thanks to all for the immersive support on the previo...
๐3๐ฅ1
๐ Web Poisoning: A Growing Threat to Online Security | 2023
๐ https://hacklido.com/blog/475-web-poisoning-a-growing-threat-to-online-security-2023
๐ https://hacklido.com/blog/475-web-poisoning-a-growing-threat-to-online-security-2023
HACKLIDO
Web Poisoning: A Growing Threat to Online Security | 2023
Understanding the Basics of Web Poisoning Attack in Web Pentesting | Karthikeyan Nagaraj One of the most concerning types of cybercrime is web poisoning...
โค1๐ฅ1
๐ ALL ABOUT XSS CROSS SITE SCRIPTING -- BASIC KNOWLEDGE
๐ https://hacklido.com/blog/476-all-about-xss-cross-site-scripting-basic-knowledge
๐ https://hacklido.com/blog/476-all-about-xss-cross-site-scripting-basic-knowledge
HACKLIDO
ALL ABOUT XSS CROSS SITE SCRIPTING -- BASIC KNOWLEDGE
Hi i am Deepak , part time bug hunter pursuing B.com In this write-up i will discuss about XSS not in deep but for beginners who want to learn about XSS...
๐2
๐ A Comprehensive Guide to Protecting Your Applications from XXE Vulnerabilities | 2023
๐ https://hacklido.com/blog/471-a-comprehensive-guide-to-protecting-your-applications-from-xxe-vulnerabilities-2023
๐ https://hacklido.com/blog/471-a-comprehensive-guide-to-protecting-your-applications-from-xxe-vulnerabilities-2023
HACKLIDO
A Comprehensive Guide to Protecting Your Applications from XXE Vulnerabilities | 2023
Understanding XML External Entity (XXE) Attacks: Working Principle, Exploitation, and Prevention Techniques | Karthikeyan Nagaraj Introduction: In todayโs...
๐ How I Uncovered a Local file inclusion Vulnerability on Website
๐ https://hacklido.com/blog/478-how-i-uncovered-a-local-file-inclusion-vulnerability-on-website
๐ https://hacklido.com/blog/478-how-i-uncovered-a-local-file-inclusion-vulnerability-on-website
HACKLIDO
How I Uncovered a Local file inclusion Vulnerability on Website
As a security researcher, I constantly test websites for flaws that hackers might use against them. A Local File Inclusion (LFI) flaw that could let an attac...
๐ Here is why CHAT-GPT is not going to take away your infosec-jobs...
๐ https://hacklido.com/blog/480-here-is-why-chat-gpt-is-not-going-to-take-away-your-infosec-jobs
๐ https://hacklido.com/blog/480-here-is-why-chat-gpt-is-not-going-to-take-away-your-infosec-jobs
HACKLIDO
Here is why CHAT-GPT is not going to take away your infosec-jobs...
This year it was indeed a roller-coaster ride. Artificial intelligence has changed up everything, everywhere we see and hear the news that A.I is going to...