DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Learn Ethical hacking in 2023 (detailed overview)

Learn Ethical hacking in 2023 (detailed overview)

19
Comments 2
3 min read
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”

Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”

4
Comments
4 min read
What is JSON with padding?

What is JSON with padding?

3
Comments
2 min read
Certificate Parsing with `domain-recon`

Certificate Parsing with `domain-recon`

12
Comments
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

9
Comments 1
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)

Using DNS as C2 Communication - Evasive Techniques (Part 3)

2
Comments
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos

Thinking Like a Hacker: AWS Keys in Private Repos

5
Comments
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

1
Comments 2
4 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

6
Comments
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability

Top 5 Tools and Practical Steps in Checking Website Vulnerability

7
Comments
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions

🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions

8
Comments
3 min read
From App User to Tenant Admin

From App User to Tenant Admin

1
Comments
3 min read
Logging with the administrator's user account OWASP Juice shop

Logging with the administrator's user account OWASP Juice shop

9
Comments
5 min read
The best hacking tools in 2022

The best hacking tools in 2022

7
Comments
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

7
Comments
4 min read
Ferramentas não-devs pra fazer sua carreira decolar

Ferramentas não-devs pra fazer sua carreira decolar

4
Comments
3 min read
Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
Breaking Down Another Phishing Attempt

Breaking Down Another Phishing Attempt

Comments
7 min read
How to hack a .NET Core game

How to hack a .NET Core game

5
Comments 2
12 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

4
Comments
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

31
Comments 1
2 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
Trends at Blackhat Asia 2022

Trends at Blackhat Asia 2022

8
Comments
4 min read
Setting up reconftw

Setting up reconftw

20
Comments
9 min read
loading...