π Reverse Engineering β Analyzing Headers
π https://hacklido.com/blog/593-reverse-engineering-analyzing-headers
π https://hacklido.com/blog/593-reverse-engineering-analyzing-headers
HACKLIDO
Reverse Engineering β Analyzing Headers
objdump is a command line tool that can be used to gain insight into an executable binary. In this article, the tool will be used to dump all of the headers...
π3β€2
π Hacklido Bi-Monthly Newsletter's 2nd version is up for August.
π Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 31st August, 2023
πhttps://hacklido.substack.com/p/newsletter-august-31st
π Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 31st August, 2023
πhttps://hacklido.substack.com/p/newsletter-august-31st
Substack
Cyber Security Round Up - August 31st, 2023
Reverse Engineering, python for hackers, Blockchain security, Blind SSRF, Wireless Hacking, Account takeover, and more...
π Finding Clues in the Past: Unveiling Vulnerabilities with Wayback-Machine.
π https://hacklido.com/blog/594-finding-clues-in-the-past-unveiling-vulnerabilities-with-wayback-machine
π https://hacklido.com/blog/594-finding-clues-in-the-past-unveiling-vulnerabilities-with-wayback-machine
HACKLIDO
Finding Clues in the Past: Unveiling Vulnerabilities with Wayback-Machine.
Hey there, fellow readers! Itβs been a while, but Iβm back β 0Γ2458 in the house! Today, weβre going to dive into something fascinating β the Wayback Machine...
π1
π "The Cybersecurity Chronicles: Part 1 β Getting Started with Google's Certificate"
π https://hacklido.com/blog/596-the-cybersecurity-chronicles-part-1-getting-started-with-googles-certificate
π https://hacklido.com/blog/596-the-cybersecurity-chronicles-part-1-getting-started-with-googles-certificate
HACKLIDO
"The Cybersecurity Chronicles: Part 1 β Getting Started with Google's Certificate"
Few months ago, google launched itβs own cyber-security certificate so that they can bridge cybersecurity skills gap in the industry. Luckily our coll...
π Insider Threat Detection in AWS Cloud using Data Mining
π https://hacklido.com/blog/595-insider-threat-detection-in-aws-cloud-using-data-mining
π https://hacklido.com/blog/595-insider-threat-detection-in-aws-cloud-using-data-mining
HACKLIDO
Insider Threat Detection in AWS Cloud using Data Mining
Insider Threat- βAn insider threat is a security risk that originates from within the targeted organization. It typically involves a current or former employ...
π1
π Ensuring Smooth Operations: Navigating Cloud Security for Small Businesses
π https://hacklido.com/blog/597-ensuring-smooth-operations-navigating-cloud-security-for-small-businesses
π https://hacklido.com/blog/597-ensuring-smooth-operations-navigating-cloud-security-for-small-businesses
HACKLIDO
Ensuring Smooth Operations: Navigating Cloud Security for Small Businesses
Introduction In todayβs fast-paced business environment, the cloud has become an essential tool for enhancing operations and flexibility. Following our d...
π₯1
π A Beginners Guide to OSINT | Day1 of 30DaysOfOSIN
π https://hacklido.com/blog/598-a-beginners-guide-to-osint-day1-of-30daysofosint
π https://hacklido.com/blog/598-a-beginners-guide-to-osint-day1-of-30daysofosint
HACKLIDO
A Beginners Guide to OSINT | Day1 of 30DaysOfOSINT
The main aim of writing this blog is to guide newbies in starting their journey in the world of Open Source Intelliegence. Helping them in understading wha...
β€1
π My debut with a Critical Bug: How I found my first bug (API misconfiguration)
π https://hacklido.com/blog/599-my-debut-with-a-critical-bug-how-i-found-my-first-bug-api-misconfiguration
π https://hacklido.com/blog/599-my-debut-with-a-critical-bug-how-i-found-my-first-bug-api-misconfiguration
HACKLIDO
My debut with a Critical Bug: How I found my first bug (API misconfiguration)
Finally, the day arrived when I could share my own findings, rather than just reading other researchersβ findings (which I truly love to do, as they are a...
π What and What' Not to expect from OSINT | Day2 of 30DaysOfOSINT
π https://hacklido.com/blog/600-what-and-what-not-to-expect-from-osint-day2-of-30daysofosint
π https://hacklido.com/blog/600-what-and-what-not-to-expect-from-osint-day2-of-30daysofosint
HACKLIDO
What and What' Not to expect from OSINT | Day2 of 30DaysOfOSINT
The main aim of writing this blog is to explaining people about ground realities of OSINT world. Letβs first understand what not to expect from OSINT: O...
β€1π1
π The OSINT Cycle: Getting familiar with process of data collection and analysis | Day3 of 30DaysOfOSINT
π https://hacklido.com/blog/601-the-osint-cycle-getting-familiar-with-process-of-data-collection-and-analysis-day3-of-30daysofosint
π https://hacklido.com/blog/601-the-osint-cycle-getting-familiar-with-process-of-data-collection-and-analysis-day3-of-30daysofosint
HACKLIDO
The OSINT Cycle: Getting familiar with process of data collection and analysis | Day3 of 30DaysOfOSINT
The main aim of writing this blog is to making people familiar with the OSINT cycle. What is OSINT Cycle ? As we have understood that OSINT is all about...
β€1π1
π Android Pentesting Series β I : Configuring The Android Emulator/Device With Proxy (Burp)
π https://hacklido.com/blog/602-android-pentesting-series-i-configuring-the-android-emulatordevice-with-proxy-burp
π https://hacklido.com/blog/602-android-pentesting-series-i-configuring-the-android-emulatordevice-with-proxy-burp
HACKLIDO
Android Pentesting Series β I : Configuring The Android Emulator/Device With Proxy (Burp)
Configuring Android emulator/Device can be Quite hectic Process To Properly Setup. So here I made a simple Step By Step Guide To Configure The Emulator With...
π1
π The OSINT Approaches | Day4 of 30DaysOfOSINT
π https://hacklido.com/blog/603-the-osint-approaches-day4-of-30daysofosint
π https://hacklido.com/blog/603-the-osint-approaches-day4-of-30daysofosint
HACKLIDO
The OSINT Approaches | Day4 of 30DaysOfOSINT
The main aim of writing this blog is to making people familiar with active and passive OSINT. Before we start learning about real life use cases of OSINT...
π2β€1
π Exploring the Power of OSINT: Use Cases in Various Fields of Cybersecurity | Day5 of 30DaysOfOSINT
π https://hacklido.com/blog/604-exploring-the-power-of-osint-use-cases-in-various-fields-of-cybersecurity-day5-of-30daysofosint
π https://hacklido.com/blog/604-exploring-the-power-of-osint-use-cases-in-various-fields-of-cybersecurity-day5-of-30daysofosint
HACKLIDO
Exploring the Power of OSINT: Use Cases in Various Fields of Cybersecurity | Day5 of 30DaysOfOSINT
The main aim of writing this blog is to making people various use cases of OSINT in various fields of cybersecurity As we have already learned about OSINT,...
β€1π1
π Android Pentesting Series β II : Setting up the CA Certs For Intercepting Web Traffic
π https://hacklido.com/blog/605-android-pentesting-series-ii-setting-up-the-ca-certs-for-intercepting-web-traffic
π https://hacklido.com/blog/605-android-pentesting-series-ii-setting-up-the-ca-certs-for-intercepting-web-traffic
HACKLIDO
Android Pentesting Series β II : Setting up the CA Certs For Intercepting Web Traffic
In The First Part Iβve Shared about How to Configure The Android Emulator/Device With Proxy (Burp) Iβd recommend If you havenβt checked The First Part. Chec...
π1
π Hacklido Bi-Monthly Newsletter's 1st version is up for September.
π Apologies, for the delayed issues due to some issues. Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 15th September, 2023
πhttps://hacklido.substack.com/p/cyber-security-round-up-september
π Apologies, for the delayed issues due to some issues. Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 15th September, 2023
πhttps://hacklido.substack.com/p/cyber-security-round-up-september
Substack
Cyber Security Round Up - September 15th, 2023
Android Pentesting, OSINT Guide, Threat Detection, Directory Traversal, Reverse Engineering,Cloud Security and more.
π Mastering OSINT: Building the Ultimate Environment for Open Source Intelligence | Day6 of 30DaysOfOSINT
π https://hacklido.com/blog/607-mastering-osint-building-the-ultimate-environment-for-open-source-intelligence-day6-of-30daysofosint
π https://hacklido.com/blog/607-mastering-osint-building-the-ultimate-environment-for-open-source-intelligence-day6-of-30daysofosint
HACKLIDO
Mastering OSINT: Building the Ultimate Environment for Open Source Intelligence | Day6 of 30DaysOfOSINT
The main of aim of writing this blog is to help you guys in setting up your virtual environment for OSINT. Before we deep dive into to installing Linux an...
π1
π Cisco's Historic $28 Billion Acquisition of Splunk in Cash
π https://hacklido.com/blog/608-ciscos-historic-28-billion-acquisition-of-splunk-in-cash
π https://hacklido.com/blog/608-ciscos-historic-28-billion-acquisition-of-splunk-in-cash
HACKLIDO
Cisco's Historic $28 Billion Acquisition of Splunk in Cash
In a monumental move, Cisco is set to acquire cybersecurity powerhouse Splunk for $28 billion in a cash transaction, marking the companyβs most significant...
π Setting up your own VM for OSINT | Day7 of 30DaysOfOSINT
π https://hacklido.com/blog/609-setting-up-your-own-vm-for-osint-day7-of-30daysofosint
π https://hacklido.com/blog/609-setting-up-your-own-vm-for-osint-day7-of-30daysofosint
HACKLIDO
Setting up your own VM for OSINT | Day7 of 30DaysOfOSINT
The main aim of writing this blog is teaching you how to setup your own VM for OSINT for best results. Before we start setting up the VM for OSINT. Letβs...
π3
π Revealing Deepfakes with Blockchain
π https://hacklido.com/blog/610-revealing-deepfakes-with-blockchain
π https://hacklido.com/blog/610-revealing-deepfakes-with-blockchain
HACKLIDO
Revealing Deepfakes with Blockchain
When we interviewed Suresh Sankaran Srinivasan (Group Head of Cyber Defence at Axiata) for the blog, he mentioned that deepfake tech is giving threat actor...
π Should employees use their own devices at work?
π hacklido.com/blog/611-should-employees-use-their-own-devices-at-work
π hacklido.com/blog/611-should-employees-use-their-own-devices-at-work
HACKLIDO
Should employees use their own devices at work?
The pros and cons of an organisation letting its employees use their own mobile devices for work. Why? π Because weβve been thinking about something Georg...