DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Logging with the administrator's user account OWASP Juice shop

Logging with the administrator's user account OWASP Juice shop

7
Comments
5 min read
The best hacking tools in 2022

The best hacking tools in 2022

7
Comments
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

7
Comments
4 min read
Ferramentas não-devs pra fazer sua carreira decolar

Ferramentas não-devs pra fazer sua carreira decolar

4
Comments
3 min read
Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
Breaking Down Another Phishing Attempt

Breaking Down Another Phishing Attempt

Comments
7 min read
How to hack a .NET Core game

How to hack a .NET Core game

5
Comments 2
12 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

4
Comments
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

26
Comments 1
2 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
Trends at Blackhat Asia 2022

Trends at Blackhat Asia 2022

8
Comments
4 min read
Setting up reconftw

Setting up reconftw

17
Comments
9 min read
How Can You Hack Into An Android Device 📱 In 2022?

How Can You Hack Into An Android Device 📱 In 2022?

10
Comments 1
4 min read
Insomni’Hack : un résumé des confs que nous avons vu

Insomni’Hack : un résumé des confs que nous avons vu

4
Comments
3 min read
A Beginner's Guide to Penetration Testing (Part 2)

A Beginner's Guide to Penetration Testing (Part 2)

7
Comments
6 min read
TryHackMe(THM)-Mrrobot Writeup

TryHackMe(THM)-Mrrobot Writeup

8
Comments
4 min read
A Beginner's Guide to Penetration Testing (Part 1)

A Beginner's Guide to Penetration Testing (Part 1)

8
Comments
5 min read
🚀 Space Heroes 2022 CTF write-up

🚀 Space Heroes 2022 CTF write-up

8
Comments
17 min read
OverTheWire Bandit Levels 19-34 Hints and Notes

OverTheWire Bandit Levels 19-34 Hints and Notes

6
Comments
12 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
One-click attack nima?

One-click attack nima?

10
Comments 6
1 min read
OverTheWire Bandit Levels 0-18 Hints and Notes

OverTheWire Bandit Levels 0-18 Hints and Notes

5
Comments
8 min read
How I hacked My Neighbor's Wi-Fi 📶

How I hacked My Neighbor's Wi-Fi 📶

6
Comments
3 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng

Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng

25
Comments 1
3 min read
Security Information and Event Management (SIEM) using Microsoft Sentinel.

Security Information and Event Management (SIEM) using Microsoft Sentinel.

10
Comments 1
15 min read
Node.js Vulnerability Cheatsheet

Node.js Vulnerability Cheatsheet

9
Comments
16 min read
Essential linux commands for CTF, ethical hacking

Essential linux commands for CTF, ethical hacking

6
Comments
2 min read
Npm packages hacking

Npm packages hacking

6
Comments
3 min read
SSTI Method Confusion in Go.

SSTI Method Confusion in Go.

4
Comments
5 min read
[ Theme ] How to customise Termux terminal

[ Theme ] How to customise Termux terminal

9
Comments
1 min read
Reverse engineering a chrome extension

Reverse engineering a chrome extension

2
Comments
3 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

5
Comments
6 min read
Wifi-Hunter By Dark hunter 141

Wifi-Hunter By Dark hunter 141

8
Comments 2
2 min read
Unpacking js.map files

Unpacking js.map files

10
Comments
1 min read
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s

5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s

4
Comments
1 min read
API3:2019 - Excessive Data Exposure

API3:2019 - Excessive Data Exposure

3
Comments
4 min read
Intigriti 1221 - XSS Challenge Writeup

Intigriti 1221 - XSS Challenge Writeup

7
Comments
5 min read
Six Things You Can Do With A VPS (plus a free $100 credit!)

Six Things You Can Do With A VPS (plus a free $100 credit!)

4
Comments
3 min read
Let's Hack this Box - Writer (Writeup)

Let's Hack this Box - Writer (Writeup)

5
Comments
7 min read
OWASP Updates the Top 10 Web Application Security Risks

OWASP Updates the Top 10 Web Application Security Risks

2
Comments
6 min read
API1:2019 - Broken Object Level Authorization

API1:2019 - Broken Object Level Authorization

4
Comments
2 min read
Introduction to the world of Cybersecurity.

Introduction to the world of Cybersecurity.

9
Comments
4 min read
How to start your hacking career?

How to start your hacking career?

5
Comments
1 min read
Breaking Code and Letting Others Break My Code

Breaking Code and Letting Others Break My Code

3
Comments
5 min read
Hack the Box - Explore Walkthrough

Hack the Box - Explore Walkthrough

9
Comments 7
3 min read
What is Stored XSS?

What is Stored XSS?

3
Comments
5 min read
Video Search Engines

Video Search Engines

2
Comments
1 min read
How to be a Hacker ?

How to be a Hacker ?

2
Comments 1
1 min read
My 100 Days of Hacking !

My 100 Days of Hacking !

12
Comments 2
2 min read
API Security 101: Injection

API Security 101: Injection

3
Comments
6 min read
Why you should start your wargames journey?

Why you should start your wargames journey?

2
Comments
2 min read
How I (unintentionally) became a hacker

How I (unintentionally) became a hacker

38
Comments 3
3 min read
Polkit CVE-2021-3560

Polkit CVE-2021-3560

4
Comments
2 min read
Find Social Media Accounts in 5 Minutes with Sherlock

Find Social Media Accounts in 5 Minutes with Sherlock

28
Comments
2 min read
An Israeli team has provided hacking tool for windows.

An Israeli team has provided hacking tool for windows.

3
Comments
2 min read
Learn Hacking as Noob

Learn Hacking as Noob

5
Comments
2 min read
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

7
Comments
7 min read
An insight into security research and ethical hacking

An insight into security research and ethical hacking

8
Comments
12 min read
loading...