HACKLIDO | Cyber Security
8.04K subscribers
158 photos
18 files
1K links
Hacklido – Cybersecurity & Hacking Community
⚡️ Daily Security Tips | OSINT | Bug Bounty | Pentesting
📜 Cheatsheets • Tools • Threat Intel • Cyber News
✍️ Learn • Blog • Grow Together

🧊 https://hacklido.com
Download Telegram
🔰 #Cheat_Sheet: #GraphQL #websecurity @hacklido

Input validation
DoS prevention
Access control
Batching attacks
Tools and other best practices

cheatsheetseries.owasp.org/cheatsheets/GraphQL_Cheat_Sheet.html
🔰 #PoC exploits for #CVE -2020-17143 and CVE-2020-17141 which demonstrate the #XXE bugs against Exchange #Server. @hacklido

- Low privileged authentication only
- CVE-2020-17141 is interesting because its in the EWS
#API

https://srcincite.io/pocs/cve-2020-17143.py.txt
https://srcincite.io/pocs/cve-2020-17141.py.txt
🔰 A Small Contribution From CyberXplore Presenting SubBuster An Subdomain #Enumeration #Tool Resolving Into Ip Address & Status Codes With Various Export Options . @hacklido

Visit -
https://subbuster.cyberxplore.com

More Features Coming Soon
- Directory Brute-forcing
- SubDomain Takeover Scanning
- Automated Sensitive Information Disclosure Lookup(With Our AI Based Model & Some Regex)
- Much More Don't Forget To Share !
🔰 Decrypting File encrypted by Monaca Plugin @hacklido

http://blog.rz.my/2020/12/decrypting-monaca-encrypt-plugin.html
🔰 #Apple Patches Tens of Code Execution Vulnerabilities in #mac OS @hacklido

http://feedproxy.google.com/~r/Securityweek/~3/Vyfzpsbhj6o/apple-patches-tens-code-execution-vulnerabilities-macos

Updates released this week by Apple for its macOS operating systems patch a total of 59 vulnerabilities, including roughly 30 that could lead to the execution of arbitrary code.
read more (
https://www.securityweek.com/apple-patches-tens-code-execution-vulnerabilities-macos)
🔰 #Nmap for Pentester: Host Discovery @hacklido
https://www.hackingarticles.in/nmap-for-pentester-host-discovery/

Nmap has become one of the most popular tools in network scanning by leaving other scanners behind. Many times the hosts in some organisations are secured using
#firewalls or intrusion prevention systems which result in the failure of #scanning due to the present set of rules which are used to block network traffic. In Nmap,... Continue reading →
The post Nmap for Pentester: Host Discovery (
https://www.hackingarticles.in/nmap-for-pentester-host-discovery/) appeared first on Hacking Articles (https://www.hackingarticles.in/).