Exploiting the Silent Threat: Time-Based Blind SQL Injection via the Object_ID ParameterIntroductionSep 7, 2024Sep 7, 2024
Mastering the Art of Logging: A Hacker’s Guide to Monitoring SystemsIn the world of cybersecurity, logging is an often-overlooked but essential tool for both attackers and defenders. Whether you’re a…Aug 22, 2024Aug 22, 2024
Hacking Large Corporations: The Art and Science of ReconnaissanceIn the realm of cyberattacks, reconnaissance is the cornerstone of any sophisticated hacking operation. For hackers targeting large…Aug 15, 2024Aug 15, 2024
How I Hacked and Secured a Croatian Government Website: A White Hat JourneyIn the realm of cybersecurity, tales of hacking often evoke images of nefarious activities, shady characters, and ill-gotten gains…Aug 3, 2024Aug 3, 2024
How I Secured Berlin Polizei by Exploiting a Server-Side Misconfiguration Attack via XML-RPCAs an ethical hacker, my mission is to identify and rectify vulnerabilities before they can be exploited by malicious actors. Recently, I…Jul 22, 2024Jul 22, 2024
Why gets() is bad / Buffer OverflowsThe gets() function in C is considered bad and unsafe due to its potential for causing buffer overflows. When using gets(), the function…Dec 5, 2023Dec 5, 2023
Published inOSINT TeamMonitoring the Dark WebIn the ever-evolving landscape of cybersecurity, monitoring the dark web has become a critical task for organizations aiming to protect…Nov 7, 2023Nov 7, 2023
AWS ELB :Distributes incoming network trafficAmazon Web Services (AWS) Elastic Load Balancing (ELB) is a service designed to efficiently distribute incoming network traffic across…Oct 31, 2023Oct 31, 2023
Hacking and Securing Python ApplicationsPython applications have become indispensable tools for businesses and individuals alike. However, their widespread use also makes them…Oct 27, 2023Oct 27, 2023