DEV Community

# hacking

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Overpass 2 - Hacked - TryHackMe writeup

Overpass 2 - Hacked - TryHackMe writeup

Comments
6 min read
Security Fest 2023 - Badge CTF writeup

Security Fest 2023 - Badge CTF writeup

Comments
8 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

10
Comments
9 min read
5 Way to Prevent Out of Bounds Write

5 Way to Prevent Out of Bounds Write

Comments
6 min read
How to Prevent Out of Bounds Read

How to Prevent Out of Bounds Read

Comments
4 min read
A Theoretically Devastating Cyber Attack on America’s Gas Stations:

A Theoretically Devastating Cyber Attack on America’s Gas Stations:

Comments
3 min read
Common Misconceptions About TryHackMe

Common Misconceptions About TryHackMe

1
Comments
2 min read
TryHackMe WriteUp: RootMe

TryHackMe WriteUp: RootMe

Comments
11 min read
What is Dark Web?Hidden World Revealed

What is Dark Web?Hidden World Revealed

7
Comments
4 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

7
Comments
4 min read
Hacking 101: Common Attacks and How to Stop Them

Hacking 101: Common Attacks and How to Stop Them

1
Comments
5 min read
Get Network Passwords

Get Network Passwords

2
Comments
2 min read
Hack WiFi using Kali Linux

Hack WiFi using Kali Linux

Comments
3 min read
$350 XSS in 15 minutes

$350 XSS in 15 minutes

1
Comments
3 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

1
Comments
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

1
Comments
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

1
Comments
6 min read
ChatGPT can be used to hack you ‚ÄĒ Experts warn

ChatGPT can be used to hack you ‚ÄĒ Experts warn

2
Comments
6 min read
Learn Ethical hacking in 2023 (detailed overview)

Learn Ethical hacking in 2023 (detailed overview)

19
Comments 1
3 min read
Portuguese Cybersecurity Competition CTF Write-up

Portuguese Cybersecurity Competition CTF Write-up

5
Comments
9 min read
Damn Vulnerable DeFI 2022 Walkthrough ‚ÄĒ Challenge 2 Solution ‚ÄúNaive Receiver‚ÄĚ

Damn Vulnerable DeFI 2022 Walkthrough ‚ÄĒ Challenge 2 Solution ‚ÄúNaive Receiver‚ÄĚ

6
Comments
4 min read
How to setup Metasploitable in a Mac with M1 chip

How to setup Metasploitable in a Mac with M1 chip

6
Comments 4
5 min read
Replaying network requests on puppeteer

Replaying network requests on puppeteer

2
Comments
3 min read
What is JSON with padding?

What is JSON with padding?

3
Comments
2 min read
Certificate Parsing with `domain-recon`

Certificate Parsing with `domain-recon`

12
Comments
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

9
Comments 1
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)

Using DNS as C2 Communication - Evasive Techniques (Part 3)

2
Comments
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos

Thinking Like a Hacker: AWS Keys in Private Repos

5
Comments
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

1
Comments 2
4 min read
Logging with the administrator's user account OWASP Juice shop

Logging with the administrator's user account OWASP Juice shop

4
Comments
5 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

6
Comments
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability

Top 5 Tools and Practical Steps in Checking Website Vulnerability

7
Comments
5 min read
ūüź≥ Docker x Hacktoberfest 2022 - How to Build Docker Extensions

ūüź≥ Docker x Hacktoberfest 2022 - How to Build Docker Extensions

8
Comments
3 min read
Breaking Down Another Phishing Attempt

Breaking Down Another Phishing Attempt

Comments
7 min read
From App User to Tenant Admin

From App User to Tenant Admin

1
Comments
3 min read
The best hacking tools in 2022

The best hacking tools in 2022

7
Comments
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

7
Comments
4 min read
Ferramentas n√£o-devs pra fazer sua carreira decolar

Ferramentas n√£o-devs pra fazer sua carreira decolar

4
Comments 1
3 min read
Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
Linux: The Commands to Know

Linux: The Commands to Know

11
Comments
3 min read
How to hack a .NET Core game

How to hack a .NET Core game

5
Comments 2
12 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

3
Comments
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

13
Comments
2 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
Trends at Blackhat Asia 2022

Trends at Blackhat Asia 2022

8
Comments
4 min read
Setting up reconftw

Setting up reconftw

12
Comments
9 min read
How Can You Hack Into An Android Device ūüďĪ In 2022?

How Can You Hack Into An Android Device ūüďĪ In 2022?

9
Comments 1
4 min read
Insomni’Hack : un résumé des confs que nous avons vu

Insomni’Hack : un résumé des confs que nous avons vu

4
Comments
3 min read
A Beginner's Guide to Penetration Testing (Part 2)

A Beginner's Guide to Penetration Testing (Part 2)

7
Comments
6 min read
TryHackMe(THM)-Mrrobot Writeup

TryHackMe(THM)-Mrrobot Writeup

8
Comments
4 min read
A Beginner's Guide to Penetration Testing (Part 1)

A Beginner's Guide to Penetration Testing (Part 1)

8
Comments
5 min read
CTF Writeup: picoCTF 2022

CTF Writeup: picoCTF 2022

10
Comments 1
40 min read
ūüöÄ Space Heroes 2022 CTF write-up

ūüöÄ Space Heroes 2022 CTF write-up

6
Comments
17 min read
CTF Writeup: VishwaCTF 2022

CTF Writeup: VishwaCTF 2022

6
Comments
19 min read
OverTheWire Bandit Levels 19-34 Hints and Notes

OverTheWire Bandit Levels 19-34 Hints and Notes

5
Comments
12 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
CTF Writeup: UTCTF 2022

CTF Writeup: UTCTF 2022

5
Comments
21 min read
CTF Writeup: 1337UP CTF 2022

CTF Writeup: 1337UP CTF 2022

5
Comments
4 min read
One-click attack nima?

One-click attack nima?

10
Comments 6
1 min read
loading...