Hacklido's Bi-Monthly Newsletter's First version is up on Substack!
Make sure to subscribe for awesome Newsletter content.
https://hacklido.substack.com/p/cyber-security-round-up-may-31st
Make sure to subscribe for awesome Newsletter content.
https://hacklido.substack.com/p/cyber-security-round-up-may-31st
Substack
Cyber Security Round Up - May 31st, 23
We make sure to keep you updated with the latest Infosec trends around the globe.
π1
π How I was able to buy free Red Bull | Parameter Tampering
π https://hacklido.com/blog/458-how-i-was-able-to-buy-free-red-bull-parameter-tampering
π https://hacklido.com/blog/458-how-i-was-able-to-buy-free-red-bull-parameter-tampering
HACKLIDO
How i was able to buy free Red Bull | Parameter Tampering
Introduction: Android has become the industry standard platform for mobile apps, offering a wide range of features and functionalities. The need to fix po...
π Understanding Broken Authentication in OWASP API2: A Comprehensive Guide | 2023
π https://hacklido.com/blog/461-understanding-broken-authentication-in-owasp-api2-a-comprehensive-guide-2023
π https://hacklido.com/blog/461-understanding-broken-authentication-in-owasp-api2-a-comprehensive-guide-2023
HACKLIDO
Understanding Broken Authentication in OWASP API2: A Comprehensive Guide | 2023
Exploring the Working Principle, Exploitation Techniques, and Prevention Measures of Broken Authentication in OWASP API2 | Karthikeyan Nagaraj Introductio...
π Pentesterβs Guide to Performing File Transfers
π https://hacklido.com/blog/460-pentesters-guide-to-performing-file-transfers
π https://hacklido.com/blog/460-pentesters-guide-to-performing-file-transfers
π A Comparative Analysis of Vulnerability Assessment, Penetration Testing, and Red Team Engagement
π https://hacklido.com/blog/462-a-comparative-analysis-of-vulnerability-assessment-penetration-testing-and-red-team-engagement
π https://hacklido.com/blog/462-a-comparative-analysis-of-vulnerability-assessment-penetration-testing-and-red-team-engagement
π1π₯1
π The Ultimate Guide to Port Scanning using Nmap | Nmap Notes
π https://hacklido.com/blog/464-the-ultimate-guide-to-port-scanning-using-nmap-nmap-notes
π https://hacklido.com/blog/464-the-ultimate-guide-to-port-scanning-using-nmap-nmap-notes
π2
π Understanding CAN Bus Packet Manipulation Techniques for Automotive Hacking
π https://hacklido.com/blog/466-understanding-can-bus-packet-manipulation-techniques-for-automotive-hacking
π https://hacklido.com/blog/466-understanding-can-bus-packet-manipulation-techniques-for-automotive-hacking
HACKLIDO
Understanding CAN Bus Packet Manipulation Techniques for Automotive Hacking
Exploiting weaknesses in a carβs electronic systems to gain unauthorized access or control is known as βautomotive hacking.β The potential attack surface...
π₯1
π Featuring Top Cloud Security Blog articles! @hacklido
1. Top cloud security threats and how to mitigate them
2. The impact of cloud computing on cybersecurity
3. How I Found AWS API Keys using βTrufflehogβ and Validated them using βenumerate-iamβ tool
4. Security Challenges in Cloud Computing
5. Demystifying Cloud Security: Safeguarding Your Data in the Digital Age
6. Learn about Incident Response and Digital Forensic Investigation in cybersecurity
β‘οΈ Write yours at hacklido.com today!
1. Top cloud security threats and how to mitigate them
2. The impact of cloud computing on cybersecurity
3. How I Found AWS API Keys using βTrufflehogβ and Validated them using βenumerate-iamβ tool
4. Security Challenges in Cloud Computing
5. Demystifying Cloud Security: Safeguarding Your Data in the Digital Age
6. Learn about Incident Response and Digital Forensic Investigation in cybersecurity
β‘οΈ Write yours at hacklido.com today!
π€©2β€1π1
π Unlocking the Power of Linux: Basic Commands and Hacker's Toolkit! π
π https://hacklido.com/blog/467-unlocking-the-power-of-linux-basic-commands-and-hackers-toolkit
π https://hacklido.com/blog/467-unlocking-the-power-of-linux-basic-commands-and-hackers-toolkit
HACKLIDO
π»π§ Unlocking the Power of Linux: Basic Commands and Hacker's Toolkit! π
Looking to level up your Linux skills? π€π Check out this comprehensive guide to basic Linux commands that every aspiring hacker should know! From file mana...
π Analyzing VoIP Traffic with Wireshark
π https://hacklido.com/blog/469-analyzing-voip-traffic-with-wireshark
π https://hacklido.com/blog/469-analyzing-voip-traffic-with-wireshark
HACKLIDO
Analyzing VoIP Traffic with Wireshark
Analyzing VoIP Traffic with Wireshark: Unveiling Insights for Enhanced Communication Security Introduction: VoIP (Voice over Internet Protocol) has revolu...
π Basic yet effective roadmap for becoming a security researcher for free and earning a living
π https://hacklido.com/blog/470-basic-yet-effective-roadmap-for-becoming-a-security-researcher-for-free-and-earning-a-living
π https://hacklido.com/blog/470-basic-yet-effective-roadmap-for-becoming-a-security-researcher-for-free-and-earning-a-living
HACKLIDO
Basic yet effective roadmap for becoming a security researcher for free and earning a living
One of the hardest parts about learning anything on your own is not learning it, itβs learning how to learn it well. Iβll be sharing three general steps...
π Begin your cloud security journey: Solving Flaws.cloud Part-1
π https://hacklido.com/blog/472-begin-your-cloud-security-journey-solving-flawscloud-part-1
π https://hacklido.com/blog/472-begin-your-cloud-security-journey-solving-flawscloud-part-1
HACKLIDO
Begin your cloud security journey: Solving Flaws.cloud Part-1
The entire blog contains all the challenges solved by me, I solved these challenges to learn cloud security as part of my Intern tasks @Appsecco. I would l...
β€1π₯1
π Analysis of Malicous APK using MobSF (Part 1)
π https://hacklido.com/blog/473-analysis-of-malicous-apk-using-mobsf-part-1
π https://hacklido.com/blog/473-analysis-of-malicous-apk-using-mobsf-part-1
HACKLIDO
Analysis of Malicous APK using MobSF (Part 1)
Analysis of Malicous APK using MobSF (Part 1) What is APK: APK files are a sort of zip or package that include resource files and.dex files. Apk files can...
π1π1
π Linux for hackers - Part #2 | Linux Process and Storage Management
π https://hacklido.com/blog/474-linux-for-hackers-part-2-linux-process-and-storage-management
π https://hacklido.com/blog/474-linux-for-hackers-part-2-linux-process-and-storage-management
HACKLIDO
Linux for hackers - Part #2 | Linux Process and Storage Management
β₯ Introduction Welcome back to the second installment of our blog series, βLinux for Hackers.β And thanks to all for the immersive support on the previo...
π3π₯1
π Web Poisoning: A Growing Threat to Online Security | 2023
π https://hacklido.com/blog/475-web-poisoning-a-growing-threat-to-online-security-2023
π https://hacklido.com/blog/475-web-poisoning-a-growing-threat-to-online-security-2023
HACKLIDO
Web Poisoning: A Growing Threat to Online Security | 2023
Understanding the Basics of Web Poisoning Attack in Web Pentesting | Karthikeyan Nagaraj One of the most concerning types of cybercrime is web poisoning...
β€1π₯1
π ALL ABOUT XSS CROSS SITE SCRIPTING -- BASIC KNOWLEDGE
π https://hacklido.com/blog/476-all-about-xss-cross-site-scripting-basic-knowledge
π https://hacklido.com/blog/476-all-about-xss-cross-site-scripting-basic-knowledge
HACKLIDO
ALL ABOUT XSS CROSS SITE SCRIPTING -- BASIC KNOWLEDGE
Hi i am Deepak , part time bug hunter pursuing B.com In this write-up i will discuss about XSS not in deep but for beginners who want to learn about XSS...
π2
π A Comprehensive Guide to Protecting Your Applications from XXE Vulnerabilities | 2023
π https://hacklido.com/blog/471-a-comprehensive-guide-to-protecting-your-applications-from-xxe-vulnerabilities-2023
π https://hacklido.com/blog/471-a-comprehensive-guide-to-protecting-your-applications-from-xxe-vulnerabilities-2023
HACKLIDO
A Comprehensive Guide to Protecting Your Applications from XXE Vulnerabilities | 2023
Understanding XML External Entity (XXE) Attacks: Working Principle, Exploitation, and Prevention Techniques | Karthikeyan Nagaraj Introduction: In todayβs...
π How I Uncovered a Local file inclusion Vulnerability on Website
π https://hacklido.com/blog/478-how-i-uncovered-a-local-file-inclusion-vulnerability-on-website
π https://hacklido.com/blog/478-how-i-uncovered-a-local-file-inclusion-vulnerability-on-website
HACKLIDO
How I Uncovered a Local file inclusion Vulnerability on Website
As a security researcher, I constantly test websites for flaws that hackers might use against them. A Local File Inclusion (LFI) flaw that could let an attac...
π Here is why CHAT-GPT is not going to take away your infosec-jobs...
π https://hacklido.com/blog/480-here-is-why-chat-gpt-is-not-going-to-take-away-your-infosec-jobs
π https://hacklido.com/blog/480-here-is-why-chat-gpt-is-not-going-to-take-away-your-infosec-jobs
HACKLIDO
Here is why CHAT-GPT is not going to take away your infosec-jobs...
This year it was indeed a roller-coaster ride. Artificial intelligence has changed up everything, everywhere we see and hear the news that A.I is going to...
π Begin your cloud security journey: Solving Flaws.cloud Part-2
π https://hacklido.com/blog/481-begin-your-cloud-security-journey-solving-flawscloud-part-2
π https://hacklido.com/blog/481-begin-your-cloud-security-journey-solving-flawscloud-part-2
HACKLIDO
Begin your cloud security journey: Solving Flaws.cloud Part-2
The entire blog contains all the challenges solved by me, I solved these challenges to learn cloud security as part of my Intern tasks @Appsecco. I would l...