<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: The Exploit Lab</title>
    <description>The latest articles on DEV Community by The Exploit Lab (@theexploitlab).</description>
    <link>https://dev.to/theexploitlab</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2568969%2F1a466dd5-41b8-4e92-8546-bbbb6bcc6eb5.jpg</url>
      <title>DEV Community: The Exploit Lab</title>
      <link>https://dev.to/theexploitlab</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/theexploitlab"/>
    <language>en</language>
    <item>
      <title>How Hackers Use SS7</title>
      <dc:creator>The Exploit Lab</dc:creator>
      <pubDate>Tue, 17 Dec 2024 13:56:32 +0000</pubDate>
      <link>https://dev.to/theexploitlab/how-hackers-use-ss7-5g1m</link>
      <guid>https://dev.to/theexploitlab/how-hackers-use-ss7-5g1m</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/mkxHIY4o2IE?si=dYoWLpfzB16HRSAg" rel="noopener noreferrer"&gt;Full Course&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ss7</category>
      <category>kalilinux</category>
      <category>linux</category>
    </item>
    <item>
      <title>Worms, Bots, and Botnets: How Hackers Take Over the Internet!</title>
      <dc:creator>The Exploit Lab</dc:creator>
      <pubDate>Tue, 17 Dec 2024 05:42:42 +0000</pubDate>
      <link>https://dev.to/theexploitlab/worms-bots-and-botnets-how-hackers-take-over-the-internet-1omk</link>
      <guid>https://dev.to/theexploitlab/worms-bots-and-botnets-how-hackers-take-over-the-internet-1omk</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/Bjc8sW0pLwY" rel="noopener noreferrer"&gt;Youtube&lt;/a&gt;&lt;/p&gt;

</description>
      <category>botnets</category>
      <category>kali</category>
      <category>linux</category>
      <category>network</category>
    </item>
    <item>
      <title>Master Password Attacks in Minutes! Ethical Hacking Guide 🔓</title>
      <dc:creator>The Exploit Lab</dc:creator>
      <pubDate>Tue, 17 Dec 2024 05:31:32 +0000</pubDate>
      <link>https://dev.to/theexploitlab/master-password-attacks-in-minutes-ethical-hacking-guide-4bcg</link>
      <guid>https://dev.to/theexploitlab/master-password-attacks-in-minutes-ethical-hacking-guide-4bcg</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/fzVqfbLVC9Y" rel="noopener noreferrer"&gt;youtube&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kalilinux</category>
      <category>bugbounty</category>
      <category>security</category>
    </item>
    <item>
      <title>Endpoint Security Bypass EXPOSED! Hackers Don't Want You to Know This!</title>
      <dc:creator>The Exploit Lab</dc:creator>
      <pubDate>Tue, 17 Dec 2024 05:20:45 +0000</pubDate>
      <link>https://dev.to/theexploitlab/endpoint-security-bypass-exposed-hackers-dont-want-you-to-know-this-5dfp</link>
      <guid>https://dev.to/theexploitlab/endpoint-security-bypass-exposed-hackers-dont-want-you-to-know-this-5dfp</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/fREZxSax5Bk?si=K3cfAisb22CDTwLB" rel="noopener noreferrer"&gt;Youtube&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kalilinux</category>
      <category>linux</category>
      <category>archlinux</category>
      <category>hacktoberfest</category>
    </item>
    <item>
      <title>Hack Any Website?! The Shocking Truth About DNS Cache Poisoning!</title>
      <dc:creator>The Exploit Lab</dc:creator>
      <pubDate>Tue, 17 Dec 2024 04:54:17 +0000</pubDate>
      <link>https://dev.to/theexploitlab/hack-any-website-the-shocking-truth-about-dns-cache-poisoning-488k</link>
      <guid>https://dev.to/theexploitlab/hack-any-website-the-shocking-truth-about-dns-cache-poisoning-488k</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/WnI0VJOCXNg?si=sWqGq9Ugxv7Ed8Z9" rel="noopener noreferrer"&gt;Youtube&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>discuss</category>
    </item>
    <item>
      <title>How to Set Up an Access Point with a Fake Captive Portal</title>
      <dc:creator>The Exploit Lab</dc:creator>
      <pubDate>Sat, 14 Dec 2024 04:58:26 +0000</pubDate>
      <link>https://dev.to/theexploitlab/how-to-set-up-an-access-point-with-a-fake-captive-portal-2ia9</link>
      <guid>https://dev.to/theexploitlab/how-to-set-up-an-access-point-with-a-fake-captive-portal-2ia9</guid>
      <description>&lt;p&gt;If you're interested in advanced penetration testing techniques or network security, check out this &lt;a href="https://youtu.be/VQJE5z5Cb_0?si=e54fXDmZoh1A5ZsZ" rel="noopener noreferrer"&gt;Video&lt;/a&gt;. It provides a detailed guide on creating a rogue access point and deploying a fake captive portal to capture sensitive information. Learn how attackers use these setups to perform phishing attacks and test the resilience of your network against such threats. Perfect for ethical hackers and cybersecurity enthusiasts looking to strengthen their skill set.&lt;/p&gt;

</description>
      <category>kalilinux</category>
      <category>bugbounty</category>
    </item>
  </channel>
</rss>
