DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ångstromCTF Exclusive Cipher

ångstromCTF Exclusive Cipher

2
Comments
3 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

40
Comments
11 min read
Game Hacking Fundamentals

Game Hacking Fundamentals

7
Comments 2
2 min read
Stackoverflow [Android Internals CTF Ex7]

Stackoverflow [Android Internals CTF Ex7]

5
Comments
3 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

6
Comments
8 min read
Off by One [Android Internals CTF Ex8]

Off by One [Android Internals CTF Ex8]

4
Comments
5 min read
Crypto miners are killing free CI

Crypto miners are killing free CI

10
Comments
3 min read
Dissecting the PE Header [Windows PE Internals]

Dissecting the PE Header [Windows PE Internals]

7
Comments
4 min read
Validating the MZ Signature [Windows PE Internals]

Validating the MZ Signature [Windows PE Internals]

7
Comments
3 min read
Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

3
Comments
2 min read
What Are Sim-Swap Attacks?

What Are Sim-Swap Attacks?

2
Comments 2
1 min read
Introducing Tor

Introducing Tor

9
Comments 1
15 min read
Creating a Windows Project in Visual Studio [Windows PE Internals]

Creating a Windows Project in Visual Studio [Windows PE Internals]

9
Comments
1 min read
Happy Birthday Linux!

Happy Birthday Linux!

12
Comments 2
1 min read
ARA CTF Final Round Binary Exploitation Write Up

ARA CTF Final Round Binary Exploitation Write Up

3
Comments
9 min read
Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

3
Comments
6 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

10
Comments
1 min read
Inline Function Hooking [Android Internals CTF Ex6]

Inline Function Hooking [Android Internals CTF Ex6]

7
Comments
6 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

11
Comments
7 min read
Nullifying Shellcode [Android Internals CTF Ex5]

Nullifying Shellcode [Android Internals CTF Ex5]

4
Comments
8 min read
Shellcode [Android Internals CTF Ex4]

Shellcode [Android Internals CTF Ex4]

9
Comments 1
9 min read
Size Might Matter [Android Internals CTF Ex3]

Size Might Matter [Android Internals CTF Ex3]

3
Comments
2 min read
Try cracking me [Android Internals CTF Ex2]

Try cracking me [Android Internals CTF Ex2]

6
Comments
2 min read
Where (and how) can a web developer learn more about cyber security?

Where (and how) can a web developer learn more about cyber security?

11
Comments 2
1 min read
.NET 5: How to authenticate & authorise API's correctly

.NET 5: How to authenticate & authorise API's correctly

17
Comments 2
7 min read
Clickjacking Attacks and Prevention

Clickjacking Attacks and Prevention

9
Comments
4 min read
Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Top 13 AWS EC2 Misconfigurations To Avoid in 2021

3
Comments
4 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

22
Comments
5 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

10
Comments
6 min read
Top 8 Security Podcasts for Developers

Top 8 Security Podcasts for Developers

17
Comments 1
9 min read
Session Fixation Attacks and Prevention

Session Fixation Attacks and Prevention

17
Comments
5 min read
MITM (Man-In-The-Middle) Attacks and Prevention

MITM (Man-In-The-Middle) Attacks and Prevention

21
Comments 8
6 min read
Is this the future of the Yubikey ?

Is this the future of the Yubikey ?

3
Comments 2
1 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

20
Comments 2
1 min read
Nmap Basics

Nmap Basics

2
Comments
1 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

83
Comments
10 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

12
Comments
12 min read
Getting started with Penetration Testing and building your own pentest methodology.

Getting started with Penetration Testing and building your own pentest methodology.

18
Comments 3
27 min read
File Encrypter and Decrypter

File Encrypter and Decrypter

7
Comments
3 min read
HSTS Header (Strict Transport Security) Explained

HSTS Header (Strict Transport Security) Explained

8
Comments 5
6 min read
Tryhackme Blue

Tryhackme Blue

3
Comments
1 min read
Content Security Policy Header: A Complete Guide

Content Security Policy Header: A Complete Guide

10
Comments
15 min read
Writeup: HackTheBox Bashed- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Bashed- Without Metasploit (OSCP Prep)

2
Comments
8 min read
SameSite Cookies and Why You Need Them

SameSite Cookies and Why You Need Them

8
Comments
7 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

20
Comments 1
5 min read
Putting Security in DevOps

Putting Security in DevOps

1
Comments
1 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

64
Comments
4 min read
An Introdution to Networks - A TryHackMe Introductory Networking WriteUp

An Introdution to Networks - A TryHackMe Introductory Networking WriteUp

20
Comments
15 min read
Python keylogger in 5 minutes

Python keylogger in 5 minutes

20
Comments 4
2 min read
Know The Web: SOP (Same Origin Policy)

Know The Web: SOP (Same Origin Policy)

4
Comments
4 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

23
Comments
10 min read
XXE (XML External Entity) Attack & Prevention

XXE (XML External Entity) Attack & Prevention

7
Comments
6 min read
Achieving Cloud Native Security and Compliance with Teleport

Achieving Cloud Native Security and Compliance with Teleport

2
Comments
12 min read
Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

18
Comments
7 min read
Authentication vs. Authorization

Authentication vs. Authorization

161
Comments 4
2 min read
Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

4
Comments 1
4 min read
Hack The Box: Invite Challenge

Hack The Box: Invite Challenge

7
Comments
3 min read
Need Contributors!!!

Need Contributors!!!

3
Comments 1
1 min read
Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

9
Comments 2
4 min read
Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

9
Comments 5
3 min read
loading...