<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: madhiashabih</title>
    <description>The latest articles on DEV Community by madhiashabih (@madhiashabih).</description>
    <link>https://dev.to/madhiashabih</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3241532%2F08a0077a-a350-4871-94b1-da99500464d0.jpg</url>
      <title>DEV Community: madhiashabih</title>
      <link>https://dev.to/madhiashabih</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/madhiashabih"/>
    <language>en</language>
    <item>
      <title>Network Enumeration with Nmap Walkthrough (Hack The Box)</title>
      <dc:creator>madhiashabih</dc:creator>
      <pubDate>Fri, 05 Sep 2025 10:52:21 +0000</pubDate>
      <link>https://dev.to/madhiashabih/htbs-network-enumeration-with-nmap-exercises-walkthrough-ol4</link>
      <guid>https://dev.to/madhiashabih/htbs-network-enumeration-with-nmap-exercises-walkthrough-ol4</guid>
      <description>&lt;h1&gt;
  
  
  Walkthrough
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Host Discovery
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Based on the last result, find out which operating system it belongs to. Submit the name of the operating system as result.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &amp;lt;redacted-ip&amp;gt; &lt;span class="nt"&gt;-sn&lt;/span&gt; &lt;span class="nt"&gt;-oA&lt;/span&gt; host &lt;span class="nt"&gt;-PE&lt;/span&gt; &lt;span class="nt"&gt;--packet-trace&lt;/span&gt; &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Initially, I was confused about how to determine the operating system from the result. After some research, I learned that the &lt;strong&gt;time-to-live (TTL)&lt;/strong&gt; value in an ICMP reply can give a strong indication.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Windows systems typically use an initial TTL of &lt;strong&gt;128&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Linux/Unix systems typically use &lt;strong&gt;64&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Some network devices use &lt;strong&gt;255&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This clue helps narrow down the OS.&lt;/p&gt;




&lt;h2&gt;
  
  
  Host and Port Scanning
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Find all TCP ports on your target. Submit the total number of found TCP ports as the answer.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-p-&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The number of open TCP ports is the answer.&lt;/p&gt;

&lt;h3&gt;
  
  
  Enumerate the hostname of your target and submit it as the answer (case-sensitive).
&lt;/h3&gt;

&lt;p&gt;At first, I wasn’t sure how to find the hostname. It turns out that running the &lt;code&gt;-sC&lt;/code&gt; scan, which uses Nmap’s default scripts, reveals this information.&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;-sC&lt;/code&gt; option runs a curated list of scripts that the Nmap authors consider useful, safe, and quick.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The hostname can be found in the &lt;code&gt;smb-os-discovery&lt;/code&gt; result.&lt;/p&gt;




&lt;h2&gt;
  
  
  Saving the Results
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Perform a full TCP port scan on your target and create an HTML report. Submit the number of the highest port as the answer.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &amp;lt;redacted-ip&amp;gt; &lt;span class="nt"&gt;-oX&lt;/span&gt; target.xml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To convert the XML into HTML:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;xsltproc style.xsl target.xml &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; output.html
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To render it directly in the terminal (Linux):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;lynx output.html
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Service Enumeration
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Enumerate all ports and their services. One of the services contains the flag you have to submit as the answer.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-p22&lt;/span&gt;,80,110,139,143,445,31337 &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Nmap Scripting Engine
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Use NSE and its scripts to find the flag that one of the services contain and submit it as the answer.
&lt;/h3&gt;

&lt;p&gt;I followed the methods outlined in the module as a guide.&lt;/p&gt;

&lt;p&gt;First attempt:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &amp;lt;redacted-ip&amp;gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 80 &lt;span class="nt"&gt;-A&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No useful result.&lt;/p&gt;

&lt;p&gt;Second attempt:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &amp;lt;redacted-ip&amp;gt; &lt;span class="nt"&gt;-p&lt;/span&gt; 80 &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;--script&lt;/span&gt; vuln 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This time, I saw an interesting reference to a &lt;code&gt;robots.txt&lt;/code&gt; file.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl http://&amp;lt;redacted-ip&amp;gt;/robots.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And there it was — the flag.&lt;/p&gt;




&lt;h2&gt;
  
  
  Firewall and IDS/IPS Evasion - Easy Lab
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Our client wants to know if we can identify which operating system their machine is running. Submit the OS name as the answer.
&lt;/h3&gt;

&lt;p&gt;We want to discover the OS quietly.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-O&lt;/span&gt; &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Since this is run as root, it defaults to an &lt;code&gt;-sS&lt;/code&gt; (stealth) scan. No results were returned.&lt;/p&gt;

&lt;p&gt;This strongly suggests a firewall is blocking our attempts. Since this was a quiet scan, there were &lt;strong&gt;0 alerts triggered&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Next, I tried the method from the earlier exercise:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sn&lt;/span&gt; &lt;span class="nt"&gt;-PE&lt;/span&gt; &lt;span class="nt"&gt;--packet-trace&lt;/span&gt; &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Again, I looked at the TTL values:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Windows = 128&lt;/li&gt;
&lt;li&gt;Linux/Unix = 64&lt;/li&gt;
&lt;li&gt;Network devices = 255&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This revealed the OS is &lt;strong&gt;Linux&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Now, to learn the Linux distribution, I scanned for service versions:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-p22&lt;/span&gt;,80,110,139,143,445,10001 &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Voila!&lt;/p&gt;




&lt;h2&gt;
  
  
  Firewall and IDS/IPS Evasion - Medium Lab
&lt;/h2&gt;

&lt;h3&gt;
  
  
  After transferring configurations, the client wants to know if it’s possible to find out the target’s DNS server version. Submit the DNS server version as the answer.
&lt;/h3&gt;

&lt;p&gt;DNS typically runs on port &lt;strong&gt;53&lt;/strong&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-p53&lt;/span&gt; &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The port appeared closed. A closed port means our SYN packet received a &lt;strong&gt;RST + ACK&lt;/strong&gt; response.&lt;/p&gt;

&lt;p&gt;I then noticed the note:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;To successfully solve the exercise, we must use the UDP protocol on the VPN.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So I retried with UDP:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sUV&lt;/span&gt; &lt;span class="nt"&gt;-p53&lt;/span&gt; &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; &lt;span class="nt"&gt;-n&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Firewall and IDS/IPS Evasion - Hard Lab
&lt;/h2&gt;

&lt;h3&gt;
  
  
  The client now wants to know if it’s possible to identify the version of a specific running service. Submit the flag as the answer.
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Hint:&lt;/em&gt; The client mentioned they had to add a service critical for handling large amounts of data.&lt;/p&gt;

&lt;p&gt;First, I scanned to see what new services were present:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-Pn&lt;/span&gt; &lt;span class="nt"&gt;--disable-arp-ping&lt;/span&gt; &amp;lt;redacted-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I noticed &lt;strong&gt;Port 50000&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Next, I tried connecting with &lt;code&gt;netcat&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ncat &lt;span class="nt"&gt;-nv&lt;/span&gt; &lt;span class="nt"&gt;--source-port&lt;/span&gt; 53 &amp;lt;redacted-ip&amp;gt; 50000
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This failed locally on my ParrotOS terminal, so I switched to the Pwnbox. I initially hit a “permission denied” error, but running it with &lt;code&gt;sudo&lt;/code&gt; worked:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;ncat &lt;span class="nt"&gt;-nv&lt;/span&gt; &lt;span class="nt"&gt;--source-port&lt;/span&gt; 53 &amp;lt;redacted-ip&amp;gt; 50000
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
    </item>
    <item>
      <title>Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]</title>
      <dc:creator>madhiashabih</dc:creator>
      <pubDate>Wed, 30 Jul 2025 10:37:55 +0000</pubDate>
      <link>https://dev.to/madhiashabih/getting-started-web-enumeration-walkthrough-hack-the-box-hindi-3mgm</link>
      <guid>https://dev.to/madhiashabih/getting-started-web-enumeration-walkthrough-hack-the-box-hindi-3mgm</guid>
      <description>&lt;p&gt;🛠 Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;💡 Question: Run some of the web enumeration techniques you learned in this section on the target server above. Use the information you find to get the flag!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;मैं तेज़ और साफ़ चेक से शुरू करती हूँ। सबसे पहले, मैं यह कमांड चलाती हूँ:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;whatweb &amp;lt;target IP&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;जिससे वेब सर्वर की पहचान हो सके, फिर मैं विजिट करती हूँ:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://&amp;lt;target IP&amp;gt;  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;पेज सामान्य सा लगता है, इसलिए मैं सोर्स देखती हूँ (CTRL+U)—फिर भी कोई उपयोगी जानकारी नहीं मिली।&lt;/p&gt;

&lt;p&gt;फिर, मैं यह ट्राई करती हूँ:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &amp;lt;target IP&amp;gt;/robots.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;और मुझे एक disallowed path मिलता है:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/admin-login-page.php  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xmprkqfbe83w5ff5cne.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xmprkqfbe83w5ff5cne.png" alt=" " width="588" height="398"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;मैं वहां नेविगेट करती हूँ:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/admin-login-page.php  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;फिर से सोर्स कोड चेक करती हूँ—इस बार मुझे HTML कमेंट में क्रेडेंशियल्स मिलते हैं:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="c"&gt;&amp;lt;!-- TODO: remove test credentials admin:password123 --&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;उन क्रेडेंशियल्स का उपयोग कर, मैं लॉगिन करती हूँ और फ़्लैग हासिल करती हूँ।&lt;/p&gt;




</description>
      <category>hindi</category>
      <category>pentest</category>
      <category>hackthebox</category>
    </item>
    <item>
      <title>Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]</title>
      <dc:creator>madhiashabih</dc:creator>
      <pubDate>Wed, 30 Jul 2025 10:26:04 +0000</pubDate>
      <link>https://dev.to/madhiashabih/getting-started-web-enumeration-walkthrough-hack-the-box-urdu-4jak</link>
      <guid>https://dev.to/madhiashabih/getting-started-web-enumeration-walkthrough-hack-the-box-urdu-4jak</guid>
      <description>&lt;p&gt;🛠 Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;💡 &lt;em&gt;&lt;strong&gt;Question:&lt;/strong&gt; Run some of the web enumeration techniques you learned in this section on the target server above. Use the information you find to get the flag!&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;-میں واضح چیکس سے شروع کرتی ہوں۔ سب سے پہلے، میں یہ کمانڈ چلاتی ہوں&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;whatweb &amp;lt;target IP&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;-تاکہ ویب سرور کی شناخت ہو سکے، پھر وزٹ کرتی ہوں&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://&amp;lt;target IP&amp;gt;  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;صفحہ کچھ خاص نہیں لگتا، اس لیے میں اس کا سورس کوڈ دیکھتی ہوں—پھر بھی کوئی فائدہ مند چیز نہیں ملتی&lt;/p&gt;

&lt;p&gt;-اس کے بعد، میں یہ کوشش کرتی ہوں&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &amp;lt;target IP&amp;gt;/robots.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;-اور مجھے ایک ممنوعہ راستہ ملتا ہے&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/admin-login-page.php  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xmprkqfbe83w5ff5cne.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xmprkqfbe83w5ff5cne.png" alt=" " width="588" height="398"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;-میں وہاں جاتی ہوں&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/admin-login-page.php  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;-پھر سے سورس کوڈ چیک کرتی ہوں—اس بار مجھے تفصیلات ملتی ہیں&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="c"&gt;&amp;lt;!-- TODO: remove test credentials admin:password123 --&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;ان شناختی معلومات کا استعمال کر کے، میں لاگ ان کرتی ہوں اور جھنڈا حاصل کرتی ہوں۔&lt;/p&gt;

</description>
      <category>urdu</category>
      <category>pentest</category>
      <category>hackthebox</category>
    </item>
    <item>
      <title>Getting Started - Web Enumeration Walkthrough (Hack The Box)</title>
      <dc:creator>madhiashabih</dc:creator>
      <pubDate>Wed, 30 Jul 2025 09:45:07 +0000</pubDate>
      <link>https://dev.to/madhiashabih/getting-started-web-enumeration-walkthrough-hack-the-box-5h6o</link>
      <guid>https://dev.to/madhiashabih/getting-started-web-enumeration-walkthrough-hack-the-box-5h6o</guid>
      <description>&lt;h2&gt;
  
  
  🛠 Getting Started - Web Enumeration Walkthrough (Hack The Box):
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;&amp;gt; 💡 &lt;strong&gt;Question:&lt;/strong&gt; Run some of the web enumeration techniques you learned in this section on the target server above. Use the information you find to get the flag!&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I begin with quick, obvious checks. First, I run:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;  whatweb &amp;lt;target IP&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;to fingerprint the web server, then visit:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  http://&amp;lt;target IP&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The page seems uninteresting, so I view the source (&lt;code&gt;CTRL+U&lt;/code&gt;)—still nothing useful.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Next, I try:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;  curl &amp;lt;target IP&amp;gt;/robots.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and find a disallowed path:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  /admin-login-page.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;I navigate to:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  /admin-login-page.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xmprkqfbe83w5ff5cne.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xmprkqfbe83w5ff5cne.png" alt=" " width="588" height="398"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;and check the source code again—this time I find credentials in an HTML comment:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;  &lt;span class="c"&gt;&amp;lt;!-- TODO: remove test credentials admin:password123 --&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Using those creds, I log in and grab the flag.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>pentest</category>
      <category>hackthebox</category>
      <category>webenumeration</category>
    </item>
    <item>
      <title>Mind Your Data</title>
      <dc:creator>madhiashabih</dc:creator>
      <pubDate>Tue, 24 Jun 2025 11:16:31 +0000</pubDate>
      <link>https://dev.to/madhiashabih/mind-your-data-3if2</link>
      <guid>https://dev.to/madhiashabih/mind-your-data-3if2</guid>
      <description>&lt;p&gt;They say data is the new oil — and as monetary transactions become increasingly virtual, I completed the IBM SkillsBuild &lt;em&gt;Cybersecurity Fundamentals Certificate&lt;/em&gt; to share the key lessons I learned about staying private and safe.&lt;/p&gt;




&lt;h3&gt;
  
  
  The 100th time I clicked "Ignore" on that software update.
&lt;/h3&gt;

&lt;p&gt;Does that software update on your phone keep annoying you? Software updates often include patches for security vulnerabilities — so it’s wise to regularly update your devices and applications.&lt;br&gt;&lt;br&gt;
You can even schedule updates while you’re asleep — just remember to stay connected to the internet.&lt;/p&gt;




&lt;h3&gt;
  
  
  Breach here, breach everywhere!
&lt;/h3&gt;

&lt;p&gt;We all know to use long, complex passwords. But do we remember to use a different password for our bank account than we do for other sites?&lt;br&gt;&lt;br&gt;
If another account is breached, your finances will be better protected.&lt;/p&gt;




&lt;h3&gt;
  
  
  Virtually Permanent
&lt;/h3&gt;

&lt;p&gt;Remember: everything you post online is &lt;em&gt;virtually permanent&lt;/em&gt;.&lt;br&gt;&lt;br&gt;
Even small pieces of information can add credibility to a social engineering attack.&lt;/p&gt;




&lt;h3&gt;
  
  
  If something is too good to be true, it probably is.
&lt;/h3&gt;

&lt;p&gt;You receive an email from a "representative of a lottery" congratulating you on winning a grand prize.&lt;br&gt;&lt;br&gt;
Or maybe a message from a bank asking you to update your password.  &lt;/p&gt;

&lt;p&gt;These are common examples of &lt;strong&gt;social engineering&lt;/strong&gt; — where someone tries to trick you into giving up private information.&lt;br&gt;&lt;br&gt;
Don’t be afraid to challenge suspicious requests.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;And remember:&lt;/strong&gt; if something is too good to be true, it probably is.&lt;/p&gt;




&lt;h3&gt;
  
  
  Something phishy about this email? Here's how to spot it:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Were you expecting this email?
&lt;/li&gt;
&lt;li&gt;Is it from someone or a company you recognize?
&lt;/li&gt;
&lt;li&gt;Does it use a generic greeting instead of your name?
&lt;/li&gt;
&lt;li&gt;Does it contain poor grammar or spelling errors?
&lt;/li&gt;
&lt;li&gt;Does it create a false sense of urgency?
&lt;/li&gt;
&lt;li&gt;Is it asking for your password or bank details?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Don’t click on links without verifying the URL.&lt;br&gt;&lt;br&gt;
Look for &lt;code&gt;https://&lt;/code&gt; and check for misspellings or unusual characters in the web address.&lt;/p&gt;




&lt;h3&gt;
  
  
  Principle of Least Privilege
&lt;/h3&gt;

&lt;p&gt;This concept is often used in organizations to prevent cyberattacks, but it’s a useful mindset for everyone.&lt;br&gt;&lt;br&gt;
It simply means: give apps or users only the permissions they &lt;em&gt;need&lt;/em&gt;.  &lt;/p&gt;

&lt;p&gt;For example:&lt;br&gt;&lt;br&gt;
I only enable location access &lt;em&gt;when I actually need the app to use it&lt;/em&gt;.&lt;/p&gt;




&lt;p&gt;Cybersecurity isn’t just for tech professionals — it’s for all of us.&lt;br&gt;&lt;br&gt;
Hopefully, these tips help you stay a little safer online.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>privacy</category>
    </item>
  </channel>
</rss>
