DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
XXE (XML External Entity) Attack & Prevention

XXE (XML External Entity) Attack & Prevention

Reactions 7 Comments
6 min read
How I Documented, Encrypted, and Tested My First REST API

How I Documented, Encrypted, and Tested My First REST API

Reactions 5 Comments
4 min read
Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

Reactions 15 Comments
7 min read
Hack The Box: Phonebook

Hack The Box: Phonebook

Reactions 2 Comments
6 min read
Hack The Box: Invite Challenge

Hack The Box: Invite Challenge

Reactions 5 Comments
3 min read
Hack The Box: Templated

Hack The Box: Templated

Reactions 3 Comments
3 min read
Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Reactions 4 Comments
4 min read
Need Contributors!!!

Need Contributors!!!

Reactions 3 Comments 1
1 min read
Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Reactions 5 Comments
3 min read
Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Reactions 5 Comments
4 min read
Top 10 Extensions You Must Use For Your Privacy

Top 10 Extensions You Must Use For Your Privacy

Reactions 4 Comments
6 min read
Authentication vs. Authorization

Authentication vs. Authorization

Reactions 159 Comments 4
2 min read
Understanding Permissions On Linux

Understanding Permissions On Linux

Reactions 7 Comments 2
3 min read
This is not called Hacking ?

This is not called Hacking ?

Reactions 4 Comments
3 min read
Bypassing Google XSS challenge

Bypassing Google XSS challenge

Reactions 2 Comments
4 min read
Pwnable.kr - Bof: Write-Up (with rizin and pwntools)

Pwnable.kr - Bof: Write-Up (with rizin and pwntools)

Reactions 4 Comments
3 min read
TryHackMe - ToolsRUs WriteUp

TryHackMe - ToolsRUs WriteUp

Reactions 2 Comments
6 min read
Administrative Access Commands On Linux

Administrative Access Commands On Linux

Reactions 8 Comments 1
2 min read
Protegendo seu servidor contra acessos indevidos

Protegendo seu servidor contra acessos indevidos

Reactions 4 Comments
2 min read
ARM shellcode

ARM shellcode

Reactions 3 Comments
2 min read
Wreaking Havoc via an API (with Python code)

Wreaking Havoc via an API (with Python code)

Reactions 5 Comments
5 min read
Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Reactions 13 Comments
3 min read
Common Cyber Attacks

Common Cyber Attacks

Reactions 5 Comments 1
8 min read
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

Reactions 625 Comments 16
7 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

Reactions 42 Comments 3
8 min read
fireEye - Biggest Cyber attack just got public | solarwinds

fireEye - Biggest Cyber attack just got public | solarwinds

Reactions 2 Comments 1
7 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

Reactions 29 Comments 12
3 min read
Breach — Enabling emergency data protection

Breach — Enabling emergency data protection

Reactions 6 Comments
6 min read
Cyber Security Introduction (part 5: Bruteforce)

Cyber Security Introduction (part 5: Bruteforce)

Reactions 20 Comments
4 min read
What Is a Code Signing and How Does It Work?

What Is a Code Signing and How Does It Work?

Reactions 3 Comments
3 min read
30D2R - July: OSINT

30D2R - July: OSINT

Reactions 2 Comments 2
4 min read
Detect Dos, ping etc.. using SNORT

Detect Dos, ping etc.. using SNORT

Reactions 5 Comments
1 min read
Cyber Security Introduction (part 4: Denial Of Service)

Cyber Security Introduction (part 4: Denial Of Service)

Reactions 14 Comments
4 min read
Internet Safety Tips

Internet Safety Tips

Reactions 4 Comments 1
2 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

Reactions 8 Comments
2 min read
[STACK CTF 2020] Find the leaking bucket

[STACK CTF 2020] Find the leaking bucket

Reactions 5 Comments
3 min read
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

Reactions 42 Comments
7 min read
Cyber Security Introduction (part 3: Man in the Middle )

Cyber Security Introduction (part 3: Man in the Middle )

Reactions 28 Comments
3 min read
A Friendly Introduction to Cybersecurity

A Friendly Introduction to Cybersecurity

Reactions 73 Comments
6 min read
Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Reactions 16 Comments 2
6 min read
Top 10 Most Common Java Vulnerabilities You Need to Prevent

Top 10 Most Common Java Vulnerabilities You Need to Prevent

Reactions 4 Comments
8 min read
[UPDATE] FireEye hacked, red team tools leaked.

[UPDATE] FireEye hacked, red team tools leaked.

Reactions 13 Comments
3 min read
VARIOUS STUDY PLANS DEPENDING ON YOUR BACKGROUND

VARIOUS STUDY PLANS DEPENDING ON YOUR BACKGROUND

Reactions 3 Comments 5
2 min read
QUICK TEN STEP GUIDE TO BUG HUNTING

QUICK TEN STEP GUIDE TO BUG HUNTING

Reactions 10 Comments
3 min read
30D2R - June: Introduction to CTFs

30D2R - June: Introduction to CTFs

Reactions 5 Comments
3 min read
Cyber Security Introduction (part 2: Phishing)

Cyber Security Introduction (part 2: Phishing)

Reactions 15 Comments
4 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

Reactions 37 Comments
3 min read
[Stacks 2020 CTF] Unlock Me - Web

[Stacks 2020 CTF] Unlock Me - Web

Reactions 9 Comments
6 min read
Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Reactions 12 Comments 1
1 min read
[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.

[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.

Reactions 16 Comments
4 min read
[Stacks 2020 CTF] Voices in the Head - Forensic

[Stacks 2020 CTF] Voices in the Head - Forensic

Reactions 18 Comments 3
5 min read
What is Hacking?

What is Hacking?

Reactions 7 Comments 13
2 min read
PCI DSS Requirements and Tips on Compliance

PCI DSS Requirements and Tips on Compliance

Reactions 5 Comments
7 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

Reactions 23 Comments 5
5 min read
The TypingDNA Hackathon Saga – Volume 1

The TypingDNA Hackathon Saga – Volume 1

Reactions 3 Comments
4 min read
How I learned Threat Intel by contributing to an open-source project

How I learned Threat Intel by contributing to an open-source project

Reactions 7 Comments
4 min read
OSINT/Creeping 1-4 @ Hacktober CTF 2020 write-up

OSINT/Creeping 1-4 @ Hacktober CTF 2020 write-up

Reactions 4 Comments
3 min read
OSINT/Past Attacks @ Hacktober CTF 2020 write-up

OSINT/Past Attacks @ Hacktober CTF 2020 write-up

Reactions 4 Comments
2 min read
Top 5 Business Benefits Of Cybersecurity Compliance

Top 5 Business Benefits Of Cybersecurity Compliance

Reactions 2 Comments
3 min read
picoCTF: where are the robots

picoCTF: where are the robots

Reactions 2 Comments 6
1 min read
loading...