# Twtxt is an open, distributed microblogging platform that # uses human-readable text files, common transport protocols, # and free software. # # Learn more about twtxt at https://github.com/buckket/twtxt # # This is an automated Yarn.social feed running feeds v0.1.0@72e53a9 # Learn more about Yarn.social at https://yarn.social # # nick = infosec-write-ups-medium # url = https://feeds.twtxt.net/infosec-write-ups-medium/twtxt.txt # type = rss # source = https://infosecwriteups.com/feed # avatar = https://feeds.twtxt.net/infosec-write-ups-medium/avatar.png#g7lgdrxj7kzxpnt5cnipgwwla267fo37sbahua7sc7vx6z6d6bdq # description = # updated_at = 2024-09-30T00:11:35Z # 2024-01-16T14:26:48Z **Exploiting Misconfigurations in Windows Service Permissions** ⌘ [Read more](https://infosecwriteups.com/elevating-permissions-exploit-permission-flaws-in-windows-services-1eb01ac5d782?source=rss----7b722bfd1b8d---4) 2024-01-17T14:43:07Z **500$ Privilege Escalation: Unauthorized Low-Privilege Users Creating Feature Bundles** ⌘ [Read more](https://infosecwriteups.com/privilege-escalation-unauthorized-low-privilege-users-creating-feature-bundles-75f6125eec78?source=rss----7b722bfd1b8d---4) 2024-01-17T14:42:48Z **1200$ IDOR Flaw: Allow Attacker To Approve Project Time Tracking** ⌘ [Read more](https://infosecwriteups.com/1200-idor-flaw-allow-attacker-to-approve-project-time-tracking-a9f64c06732a?source=rss----7b722bfd1b8d---4) 2024-01-17T14:42:39Z **Hacking into colgate smart tooth brush for fun!** ⌘ [Read more](https://infosecwriteups.com/hacking-into-colgate-smart-tooth-brush-for-fun-91d16907f20f?source=rss----7b722bfd1b8d---4) 2024-01-17T14:42:38Z **Vulnhub: DevGuru 1 Walkthrough (OSCP PREP) [by dollarboysushil]** ⌘ [Read more](https://infosecwriteups.com/vulnhub-devguru-1-walkthrough-oscp-prep-by-dollarboysushil-a77c3d3598d9?source=rss----7b722bfd1b8d---4) 2024-01-17T14:36:49Z **HTB Machines: Difficulty Matters** ⌘ [Read more](https://infosecwriteups.com/ctf-mindset-htb-machines-d306cc73fde2?source=rss----7b722bfd1b8d---4) 2024-01-17T14:36:39Z **Redeemer HackTheBox : WriteUp** ⌘ [Read more](https://infosecwriteups.com/redeemer-hackthebox-writeup-a683bf1101d9?source=rss----7b722bfd1b8d---4) 2024-01-17T14:36:37Z **1 Program, 4 Business Logic Bugs and Cashing in 2300$.** ⌘ [Read more](https://infosecwriteups.com/1-program-4-business-logic-bugs-and-cashing-in-2300-299b42236993?source=rss----7b722bfd1b8d---4) 2024-01-17T14:36:25Z **Vulnhub: Photographer 1 Walkthrough (OSCP PREP) [by dollarboysushil]** ⌘ [Read more](https://infosecwriteups.com/vulnhub-photographer-1-walkthrough-oscp-prep-by-dollarboysushil-96bc59a8034b?source=rss----7b722bfd1b8d---4) 2024-01-17T14:35:53Z **Hollywood Hacks: Cyber Security Fact from Fiction in the Movies**
[![](https://cdn-images-1.medium.com/max/1792/1*l8hkhp5DKfn6yy-9R4nmLA.png)](https://infosecwriteups.com/hollywood-hacks-cyber-security-fact-from-fiction-in-the-movies-4757f7bbb32e?source=rss----7b722bfd1b8d---4)

A socially awkward individual with exceptional keyboard skills sits in front of a futuristic multi-screen setup, a cluttered mess of…

[Continue reading on Info ... ⌘ [Read more](https://infosecwriteups.com/hollywood-hacks-cyber-security-fact-from-fiction-in-the-movies-4757f7bbb32e?source=rss----7b722bfd1b8d---4) 2024-01-17T14:35:51Z **Bypassing KYC using deepfake** ⌘ [Read more](https://infosecwriteups.com/bypassing-kyc-using-deepfake-e11f0722c722?source=rss----7b722bfd1b8d---4) 2024-01-17T14:53:58Z **Phishing using Google Sheets for Red Team Engagements** ⌘ [Read more](https://infosecwriteups.com/phishing-using-google-sheets-for-red-team-engagements-ac79298ddb90?source=rss----7b722bfd1b8d---4) 2024-01-17T14:53:46Z **Daily Bug Bounty Writeups** ⌘ [Read more](https://infosecwriteups.com/daily-bug-bounty-writeups-2d754b87a546?source=rss----7b722bfd1b8d---4) 2024-01-17T14:52:19Z **Zephyr Prolab Extravaganza:** ⌘ [Read more](https://infosecwriteups.com/zephyr-prolab-extravaganza-bf065fe18591?source=rss----7b722bfd1b8d---4) 2024-01-17T14:52:17Z **Intro to Fuzzing IoT Protocols using BooFuzz** ⌘ [Read more](https://infosecwriteups.com/intro-to-fuzzing-iot-protocols-using-boofuzz-02bab66454a7?source=rss----7b722bfd1b8d---4) 2024-01-17T14:52:16Z **Critical Chrome Zero-Day Flaw Found: Update Immediately!**
[![](https://cdn-images-1.medium.com/max/1024/1*hPBJCHtOmsIKEnWNJ_xGEw.png)](https://infosecwriteups.com/critical-chrome-zero-day-flaw-found-update-immediately-558e084e7632?source=rss----7b722bfd1b8d---4)

Google Chrome has been hit by a critical zero-day vulnerability

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/critical-chrome-zero-day-flaw-found-update-immed ... ⌘ [Read more](https://infosecwriteups.com/critical-chrome-zero-day-flaw-found-update-immediately-558e084e7632?source=rss----7b722bfd1b8d---4) 2024-01-18T14:31:32Z **Navigating Web Security with OWASP ZAP: A Beginner’s Guide** ⌘ [Read more](https://infosecwriteups.com/navigating-web-security-with-owasp-zap-a-beginners-guide-99a81d1b91d9?source=rss----7b722bfd1b8d---4) 2024-01-18T14:31:30Z **Unraveling Hashcat: A Beginner’s Guide to Password Cracking** ⌘ [Read more](https://infosecwriteups.com/unraveling-hashcat-a-beginners-guide-to-password-cracking-1628b839710b?source=rss----7b722bfd1b8d---4) 2024-01-18T14:31:23Z **Unveiling Nikto: A Beginner’s Guide to Web Server Security Scanning** ⌘ [Read more](https://infosecwriteups.com/unveiling-nikto-a-beginners-guide-to-web-server-security-scanning-e4f52c5961e7?source=rss----7b722bfd1b8d---4) 2024-01-18T14:31:17Z **Vulnhub:NULLBYTE 1 Walkthrough (OSCP PREP) [by dollarboysushil]** ⌘ [Read more](https://infosecwriteups.com/vulnhub-nullbyte-1-walkthrough-oscp-prep-by-dollarboysushil-0238e372aa45?source=rss----7b722bfd1b8d---4) 2024-01-19T03:32:09Z **Challenges, Ethical Dilemmas, and Lessons from TryHackMe** ⌘ [Read more](https://infosecwriteups.com/challenges-ethical-dilemmas-and-lessons-from-tryhackme-0450eb627986?source=rss----7b722bfd1b8d---4) 2024-01-19T03:32:07Z **Unveiling Vulnerabilities: The Challenges Inherent in Hardware Security** ⌘ [Read more](https://infosecwriteups.com/unveiling-vulnerabilities-the-challenges-inherent-in-hardware-security-fd7d26ce0957?source=rss----7b722bfd1b8d---4) 2024-01-20T15:36:54Z **Login DoS — That requires simply sending a lot of specially crafted requests** ⌘ [Read more](https://infosecwriteups.com/login-dos-that-requires-simply-sending-a-lot-of-specially-crafted-requests-2ca927c628dd?source=rss----7b722bfd1b8d---4) 2024-01-21T05:39:44Z **Building a Virtual Security Home Lab: Part 7 - Active Directory Lab Setup - Part 2** ⌘ [Read more](https://infosecwriteups.com/building-a-virtual-security-home-lab-part-7-active-directory-lab-setup-part-2-f203002a40b2?source=rss----7b722bfd1b8d---4) 2024-01-21T05:39:29Z **Exploring Google Cloud Armor: Enhancing Security in the Cloud** ⌘ [Read more](https://infosecwriteups.com/exploring-google-cloud-armor-enhancing-security-in-the-cloud-2b3762c92988?source=rss----7b722bfd1b8d---4) 2024-01-21T05:39:28Z **921$ Privilege Escalation: Unauthorized User Addition to Shared APP Connections** ⌘ [Read more](https://infosecwriteups.com/921-privilege-escalation-unauthorized-user-addition-to-shared-app-connections-0780134d6cf1?source=rss----7b722bfd1b8d---4) 2024-01-21T05:39:08Z **Authentication Bypass | Part 05 | What To Do After Choosing a Target** ⌘ [Read more](https://infosecwriteups.com/authentication-bypass-part-05-what-to-do-after-choosing-a-target-31eddc38029c?source=rss----7b722bfd1b8d---4) 2024-01-22T15:36:18Z **XSS Store in ZKTeco — Welcome to WDMS** ⌘ [Read more](https://infosecwriteups.com/xss-store-in-zkteco-welcome-to-wdms-3d5c8e1113f0?source=rss----7b722bfd1b8d---4) 2024-01-23T06:41:37Z **What You Need To Know About The 2024 CISSP Exam — New Domains**
[![](https://cdn-images-1.medium.com/max/2600/0*73A9D_TOCoY2R3Mg)](https://infosecwriteups.com/what-you-need-to-know-about-the-2024-cissp-exam-new-domains-05b4e96c21aa?source=rss----7b722bfd1b8d---4)

The Certified Information Systems Security Professional (CISSP) certification, administered by the International Information System…

[Continue reading on InfoSec Write-ups »](ht ... ⌘ [Read more](https://infosecwriteups.com/what-you-need-to-know-about-the-2024-cissp-exam-new-domains-05b4e96c21aa?source=rss----7b722bfd1b8d---4) 2024-01-23T15:52:16Z **THM — Dreaming**
[![](https://cdn-images-1.medium.com/max/2600/0*BKRGG8dqpG-s5N7F)](https://infosecwriteups.com/thm-dreaming-ed399884d794?source=rss----7b722bfd1b8d---4)

Solve the riddle that dreams have woven. While the king of dreams was imprisoned, his home fell into ruins. Can you help Sandman restore…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-dreaming-ed399884d794?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-dreaming-ed399884d794?source=rss----7b722bfd1b8d---4) 2024-01-23T16:41:00Z **Cybersecurity As Relatable As Possible — ARAP Series #1 The Shield: Understanding the CIA Triad as…** ⌘ [Read more](https://infosecwriteups.com/cybersecurity-as-relatable-as-possible-arap-series-1-the-shield-understanding-the-cia-triad-as-4dd1070b3e06?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:59Z **Cybersecurity As Relatable As Possible — Malware (#2)** ⌘ [Read more](https://infosecwriteups.com/cybersecurity-as-relatable-as-possible-malware-2-6167918ee15d?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:57Z **Cybersecurity As Relatable As Possible (#3): Dark Web — The Hidden Layers of the Internet** ⌘ [Read more](https://infosecwriteups.com/cybersecurity-as-relatable-as-possible-3-dark-web-the-hidden-layers-of-the-internet-ff7c3d2cb84b?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:44Z **Exploiting SSRF in PDF HTML Injection: Basic and Blind** ⌘ [Read more](https://infosecwriteups.com/exploiting-ssrf-in-pdf-html-injection-basic-and-blind-047fec5317ae?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:43Z **HTB Challenge | Neonify** ⌘ [Read more](https://infosecwriteups.com/htb-challenge-neonify-5f571069a229?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:36Z **Decrypting the $197 Million Euler Finance Exploit** ⌘ [Read more](https://infosecwriteups.com/decrypting-the-197-million-euler-finance-exploit-755528b9324a?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:35Z **Steal WiFi Passwords with Wifiphisher**
[![](https://cdn-images-1.medium.com/max/800/1*jC4eMNlUn4Kc8_ZkaJDGQQ.jpeg)](https://infosecwriteups.com/steal-wifi-passwords-with-wifiphisher-5f2c8fbb5270?source=rss----7b722bfd1b8d---4)

Requirements:

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/steal-wifi-passwords-with-wifiphisher-5f2c8fbb5270?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/steal-wifi-passwords-with-wifiphisher-5f2c8fbb5270?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:27Z **A Journey to EJPT Success: Navigating the Exam with a Pentester’s Mindset** ⌘ [Read more](https://infosecwriteups.com/a-journey-to-ejpt-success-navigating-the-exam-with-a-pentesters-mindset-964b10602c27?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:20Z **Discover MITRE’s CTI Blueprints: A Revolutionary New Project**
[![](https://cdn-images-1.medium.com/max/1920/1*NnvbAvO4SiTTHisU05yooQ.jpeg)](https://infosecwriteups.com/discover-mitres-cti-blueprints-a-revolutionary-new-project-3850053cf3d2?source=rss----7b722bfd1b8d---4)

Learn about a revolutionary new CTI project that aims to help analysts deliver high-quality, standardized CTI reports.

[Continue reading on InfoSec Write-ups »](https:// ... ⌘ [Read more](https://infosecwriteups.com/discover-mitres-cti-blueprints-a-revolutionary-new-project-3850053cf3d2?source=rss----7b722bfd1b8d---4) 2024-01-23T16:40:10Z **What is a Quantum Insert Attack?** ⌘ [Read more](https://infosecwriteups.com/what-is-a-quantum-insert-attack-b51bea03e2ef?source=rss----7b722bfd1b8d---4) 2024-01-24T03:04:33Z **Rust for Cyber Security and Red Teaming ** ⌘ [Read more](https://infosecwriteups.com/rust-for-cyber-security-and-red-teaming-275595d3fdec?source=rss----7b722bfd1b8d---4) 2024-01-24T15:51:35Z **THM — Probe**
[![](https://cdn-images-1.medium.com/max/2600/0*3iZP7CeIRLdr8gy9)](https://infosecwriteups.com/thm-probe-88aa40ac5e82?source=rss----7b722bfd1b8d---4)

Use your baseline scanning skills to enumerate a secure network.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-probe-88aa40ac5e82?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-probe-88aa40ac5e82?source=rss----7b722bfd1b8d---4) 2024-01-25T09:31:34Z **Bounty Hacker: TryHackMe Walkthrough** ⌘ [Read more](https://infosecwriteups.com/bounty-hacker-tryhackme-walkthrough-96eafc6c09b2?source=rss----7b722bfd1b8d---4) 2024-01-25T09:29:53Z **AWS/S3 Subdomain Takeover** ⌘ [Read more](https://infosecwriteups.com/aws-s3-subdomain-takeover-79d705cc3553?source=rss----7b722bfd1b8d---4) 2024-01-25T09:29:51Z **GitLab CVE-2023–7028 | Tryhackme Writeup/Walkthrough | By Md Amiruddin** ⌘ [Read more](https://infosecwriteups.com/gitlab-cve-2023-7028-tryhackme-writeup-walkthrough-by-md-amiruddin-062b24748826?source=rss----7b722bfd1b8d---4) 2024-01-25T09:27:23Z **Unveiling the Power of John the Ripper: A Beginner’s Guide to Password Cracking** ⌘ [Read more](https://infosecwriteups.com/unveiling-the-power-of-john-the-ripper-a-beginners-guide-to-password-cracking-a9846172b35a?source=rss----7b722bfd1b8d---4) 2024-01-25T09:27:15Z **Unleashing Metasploit: A Beginner’s Guide to Ethical Hacking** ⌘ [Read more](https://infosecwriteups.com/unleashing-metasploit-a-beginners-guide-to-ethical-hacking-da20b375081e?source=rss----7b722bfd1b8d---4) 2024-01-25T09:26:45Z **Zero-Day Alert: Fortra’s GoAnywhere MFT Compromised**
[![](https://cdn-images-1.medium.com/max/1024/1*7Xf2as5u71IyKgjGJ87WUw.png)](https://infosecwriteups.com/zero-day-alert-fortras-goanywhere-mft-compromised-569c460d160b?source=rss----7b722bfd1b8d---4)

This critical flaw, rated 9.8/10 on the Common Vulnerability Scoring System (CVSS) scale, enables unauthorized users to sneak in as…

[Continue reading on InfoSec Write-ups »](https://infosecwriteup ... ⌘ [Read more](https://infosecwriteups.com/zero-day-alert-fortras-goanywhere-mft-compromised-569c460d160b?source=rss----7b722bfd1b8d---4) 2024-01-26T15:56:54Z **BFS Ekoparty 2022 Exploitation Challenges** ⌘ [Read more](https://infosecwriteups.com/bfs-ekoparty-2022-exploitation-challenges-7deffce64ee4?source=rss----7b722bfd1b8d---4) 2024-01-28T12:29:57Z **Google Ad powered Crypto Scam** ⌘ [Read more](https://infosecwriteups.com/google-ad-powered-crypto-scam-3aeed1c9b472?source=rss----7b722bfd1b8d---4) 2024-01-28T12:41:17Z **Online Password Cracking Tool — Hydra** ⌘ [Read more](https://infosecwriteups.com/i-hacked-websites-login-page-hydra-3623f01fbb72?source=rss----7b722bfd1b8d---4) 2024-01-28T12:41:15Z **Evolution of Critical Log Sources in SIEM: A 5-Year Retrospective** ⌘ [Read more](https://infosecwriteups.com/evolution-of-critical-log-sources-in-siem-a-5-year-retrospective-841bae2b6a6c?source=rss----7b722bfd1b8d---4) 2024-01-28T12:41:11Z **10 Steps to Get Started in Bug Bounty Hunting**
[![](https://cdn-images-1.medium.com/max/1792/1*3ZaGrK4zdXm5EH-csHegNQ.png)](https://infosecwriteups.com/10-steps-to-get-started-in-bug-bounty-hunting-21e552e62ae2?source=rss----7b722bfd1b8d---4)

The potential rewards? Well, they’re not just monetary. There’s a real sense of achievement in knowing that your skills can help secure…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/10-s ... ⌘ [Read more](https://infosecwriteups.com/10-steps-to-get-started-in-bug-bounty-hunting-21e552e62ae2?source=rss----7b722bfd1b8d---4) 2024-01-28T12:38:43Z **Create a Keylogger using Python**
[![](https://cdn-images-1.medium.com/max/800/1*wlytWQvetYncpKXHqpNTZQ.jpeg)](https://infosecwriteups.com/create-a-keylogger-using-python-8395630448dc?source=rss----7b722bfd1b8d---4)

In this article, you will learn how to create a keylogger using Python. A keylogger (or keystroke logger) is a type of software that…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/create-a-keylogger-using-python-8395630448dc?sour ... ⌘ [Read more](https://infosecwriteups.com/create-a-keylogger-using-python-8395630448dc?source=rss----7b722bfd1b8d---4) 2024-01-28T12:37:49Z **The APT Files #2: Putter Panda** ⌘ [Read more](https://infosecwriteups.com/the-apt-files-2-putter-panda-e24f3559a08b?source=rss----7b722bfd1b8d---4) 2024-01-28T12:37:45Z **Building a Virtual Security Home Lab: Part 8 - Malware Analysis Lab Setup** ⌘ [Read more](https://infosecwriteups.com/building-a-virtual-security-home-lab-part-8-malware-analysis-lab-setup-acf84c665770?source=rss----7b722bfd1b8d---4) 2024-01-29T04:32:09Z **XML External Entity injection with error-based data exfiltration** ⌘ [Read more](https://infosecwriteups.com/xml-external-entity-injection-with-error-based-data-exfiltration-985b063ec820?source=rss----7b722bfd1b8d---4) 2024-01-29T13:42:19Z **HTTP Request Smuggling | Tryhackme Writeup/Walkthrough | By Md Amiruddin** ⌘ [Read more](https://infosecwriteups.com/http-request-smuggling-tryhackme-writeup-walkthrough-by-md-amiruddin-9042011e44e0?source=rss----7b722bfd1b8d---4) 2024-01-31T13:41:37Z **THM — Lesson Learned?**
[![](https://cdn-images-1.medium.com/max/2600/0*kapW_yCcgxEni8mK)](https://infosecwriteups.com/thm-lesson-learned-cc63718173c7?source=rss----7b722bfd1b8d---4)

Have you learned your lesson?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-lesson-learned-cc63718173c7?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-lesson-learned-cc63718173c7?source=rss----7b722bfd1b8d---4) 2024-02-02T04:12:26Z **Malware Configuration Parsers: An Essential Hunting Tool**
[![](https://cdn-images-1.medium.com/max/1920/1*Y4samGaRIDvyPmBLOgTCqw.jpeg)](https://infosecwriteups.com/malware-configuration-parsers-an-essential-hunting-tool-e01dd921503e?source=rss----7b722bfd1b8d---4)

Learn why malware configuration parsing is an essential skill for any threat hunter.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/malware-configuration-pa ... ⌘ [Read more](https://infosecwriteups.com/malware-configuration-parsers-an-essential-hunting-tool-e01dd921503e?source=rss----7b722bfd1b8d---4) 2024-02-02T04:12:24Z **Fundamentals of .NET Decompilation With dnSpy** ⌘ [Read more](https://infosecwriteups.com/fundamentals-of-net-decompilation-with-dnspy-e7456707b1d2?source=rss----7b722bfd1b8d---4) 2024-02-02T04:12:23Z **Clicker — HackTheBox Machine Simple Writeup by Karthikeyan Nagaraj | 2024** ⌘ [Read more](https://infosecwriteups.com/clicker-hackthebox-machine-simple-writeup-by-karthikeyan-nagaraj-2024-313b383236bd?source=rss----7b722bfd1b8d---4) 2024-02-02T04:12:21Z **Cybersecurity As Relatable As Possible — Hackers** ⌘ [Read more](https://infosecwriteups.com/cybersecurity-as-relatable-as-possible-hackers-9dff020e4e82?source=rss----7b722bfd1b8d---4) 2024-02-02T04:21:29Z **How to Get CVEs Online (Fast)** ⌘ [Read more](https://infosecwriteups.com/how-to-get-cves-online-fast-c0d6d897c04d?source=rss----7b722bfd1b8d---4) 2024-02-02T04:19:56Z **Chasing BlackTech Domain Abuse: Open sourced wayis amazing!** ⌘ [Read more](https://infosecwriteups.com/chasing-blacktech-domain-abuse-open-sourced-wayis-amazing-c524b9228497?source=rss----7b722bfd1b8d---4) 2024-02-02T04:19:49Z **What is a CVSS score?** ⌘ [Read more](https://infosecwriteups.com/understanding-cvss-score-101-a70556e81f28?source=rss----7b722bfd1b8d---4) 2024-02-02T04:19:48Z **Install Parrot OS 6** ⌘ [Read more](https://infosecwriteups.com/install-parrot-os-6-d377660205cd?source=rss----7b722bfd1b8d---4) 2024-02-02T04:19:35Z **Securing the Frontend: A Practical Guide for Developers** ⌘ [Read more](https://infosecwriteups.com/securing-the-frontend-a-practical-guide-for-developers-fd3b52029b6e?source=rss----7b722bfd1b8d---4) 2024-02-02T04:19:32Z **Fake Crypto Game Job Offer Phishing** ⌘ [Read more](https://infosecwriteups.com/fake-crypto-game-job-offer-phishing-27642662fe13?source=rss----7b722bfd1b8d---4) 2024-02-02T04:18:51Z **How to research malware for free — Simda case!** ⌘ [Read more](https://infosecwriteups.com/how-to-research-malware-for-free-simda-case-749924545b92?source=rss----7b722bfd1b8d---4) 2024-02-02T04:18:48Z **Hunting Malware with ANY.RUN** ⌘ [Read more](https://infosecwriteups.com/hunting-malware-with-any-run-282f2bb2dd57?source=rss----7b722bfd1b8d---4) 2024-02-02T04:18:38Z **Blitzstorm CTF 2024 | Web OFFICIAL Write-Up** ⌘ [Read more](https://infosecwriteups.com/blitzstorm-ctf-2024-web-official-write-up-862452b4444d?source=rss----7b722bfd1b8d---4) 2024-02-02T04:18:16Z **Zero-Day Threats: How to Detect and Defend Against the Unknown** ⌘ [Read more](https://infosecwriteups.com/zero-day-threats-how-to-detect-and-defend-against-the-unknown-75d6b3891cf9?source=rss----7b722bfd1b8d---4) 2024-02-04T19:00:03Z **Pentesting 101: A Beginner’s Guide to Ethical Hacking** ⌘ [Read more](https://infosecwriteups.com/pentesting-101-a-beginners-guide-to-ethical-hacking-6f10aeff1a45?source=rss----7b722bfd1b8d---4) 2024-02-04T18:59:45Z **How I Hacked My College’s Site** ⌘ [Read more](https://infosecwriteups.com/how-i-hacked-my-colleges-site-26ae1ab872e4?source=rss----7b722bfd1b8d---4) 2024-02-04T19:00:18Z **Mass Blind Server-Side Testing Setup For Bug Bounty**
[![](https://cdn-images-1.medium.com/max/1024/0*Gsiud4mxismqypd3.png)](https://infosecwriteups.com/mass-blind-server-side-testing-setup-for-bug-bounty-fa03213b1ec9?source=rss----7b722bfd1b8d---4)

Discover how to hunt for Out-Of-Bound issues. Set up the OOB Server to detect critical severity findings which could lead to large…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c ... ⌘ [Read more](https://infosecwriteups.com/mass-blind-server-side-testing-setup-for-bug-bounty-fa03213b1ec9?source=rss----7b722bfd1b8d---4) 2024-02-08T10:03:31Z **Update Burp Suite on Kali Linux** ⌘ [Read more](https://infosecwriteups.com/update-burp-suite-on-kali-linux-2a597e80b604?source=rss----7b722bfd1b8d---4) 2024-02-08T10:10:17Z **Write-up, Wizer Team CTF 6-hours challenge** ⌘ [Read more](https://infosecwriteups.com/write-up-wizer-team-ctf-6-hours-challenge-2fe110be3e75?source=rss----7b722bfd1b8d---4) 2024-02-08T10:09:54Z **Skyfall — HackTheBox Seasonal Machine Simple Writeup by Karthikeyan Nagaraj | 2024** ⌘ [Read more](https://infosecwriteups.com/skyfall-hackthebox-seasonal-machine-simple-writeup-by-karthikeyan-nagaraj-2024-d76fdaaba116?source=rss----7b722bfd1b8d---4) 2024-02-08T10:09:48Z **Identity of HUNTERS INTERNATIONAL Ransomware Gang DLS Exposed!** ⌘ [Read more](https://infosecwriteups.com/identity-of-hunters-international-ransomware-gang-dls-exposed-b287350a707f?source=rss----7b722bfd1b8d---4) 2024-02-08T10:09:07Z **Fortifying the Cloud: Essential Security Measures and Best Practices for Modern Organizations** ⌘ [Read more](https://infosecwriteups.com/fortifying-the-cloud-essential-security-measures-and-best-practices-for-modern-organizations-263e182510b2?source=rss----7b722bfd1b8d---4) 2024-02-08T10:29:13Z **The Most Common Way Hackers Steal Your Passwords**
[![](https://cdn-images-1.medium.com/max/800/1*dUi_r3rilxhLHrxcSjlLpg.jpeg)](https://infosecwriteups.com/the-most-common-way-hackers-steal-your-passwords-da20e70039bf?source=rss----7b722bfd1b8d---4)

A step-by-step guide on how to create a login system that steals usernames and passwords.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-most-common-way-hackers-steal-your-pas ... ⌘ [Read more](https://infosecwriteups.com/the-most-common-way-hackers-steal-your-passwords-da20e70039bf?source=rss----7b722bfd1b8d---4) 2024-02-08T10:27:40Z **Tumblr Subdomain Takeover** ⌘ [Read more](https://infosecwriteups.com/tumblr-subdomain-takeover-55f9cb494d65?source=rss----7b722bfd1b8d---4) 2024-02-08T10:27:18Z **Setting Up an iOS Pentesting Lab on a Non-Jailbroken iDevice** ⌘ [Read more](https://infosecwriteups.com/setting-up-an-ios-pentesting-lab-on-a-non-jailbroken-idevice-124a8fcf3e16?source=rss----7b722bfd1b8d---4) 2024-02-08T10:27:07Z **Rate Limiting: What It Is And Why It Matters in Bug Bounty** ⌘ [Read more](https://infosecwriteups.com/rate-limiting-what-it-is-and-why-it-matters-in-bug-bounty-b0d2ce574049?source=rss----7b722bfd1b8d---4) 2024-02-10T11:11:46Z **50+ Cyber Security Analyst Interview Tips, Questions and Answers**
[![](https://cdn-images-1.medium.com/max/2600/0*dQSH6FmX0U_iLmJz)](https://infosecwriteups.com/50-cyber-security-analyst-interview-tips-questions-and-answers-6ee7824bf21c?source=rss----7b722bfd1b8d---4)

A comprehensive list of interview questions and answers for your successful preparation to face a cyber security analyst job interview in…

[Continue reading on InfoSec ... ⌘ [Read more](https://infosecwriteups.com/50-cyber-security-analyst-interview-tips-questions-and-answers-6ee7824bf21c?source=rss----7b722bfd1b8d---4) 2024-02-11T11:11:42Z **CTF- Beginner Guide** ⌘ [Read more](https://infosecwriteups.com/ctf-beginner-guide-8566e7183f3d?source=rss----7b722bfd1b8d---4) 2024-02-12T11:11:47Z **Hack Stories: Hacking Hackers EP:1**
[![](https://cdn-images-1.medium.com/max/2600/0*k_cWkr8aEDbc3MZO)](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-1-ff4c3cfc09cc?source=rss----7b722bfd1b8d---4)

When cockiness backfires and put your company at risk.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-1-ff4c3cfc09cc?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-1-ff4c3cfc09cc?source=rss----7b722bfd1b8d---4) 2024-02-12T11:31:26Z **AppSec Tales I | Sign-up**
[![](https://cdn-images-1.medium.com/max/1920/1*8lnUTTE1D5vYaHU71fvoFg.jpeg)](https://infosecwriteups.com/appsec-tales-i-sign-up-de279f4a4354?source=rss----7b722bfd1b8d---4)

Application Security Testing of the Register form guidelines.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/appsec-tales-i-sign-up-de279f4a4354?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/appsec-tales-i-sign-up-de279f4a4354?source=rss----7b722bfd1b8d---4) 2024-02-12T11:44:24Z **Page Admin Disclosure — Meta Bug Bounty** ⌘ [Read more](https://infosecwriteups.com/page-admin-disclosure-meta-bug-bounty-66a28ec9cd6c?source=rss----7b722bfd1b8d---4) 2024-02-12T11:43:10Z **Building a Virtual Security Home Lab: Part 10 - Splunk Setup & Configuration** ⌘ [Read more](https://infosecwriteups.com/building-a-virtual-security-home-lab-part-10-splunk-setup-configuration-080921e083f8?source=rss----7b722bfd1b8d---4) 2024-02-12T11:43:07Z **Microsoft Sentinel — Custom Data Connector for Microsoft Intune** ⌘ [Read more](https://infosecwriteups.com/microsoft-sentinel-custom-data-connector-for-microsoft-intune-04b19b7e0006?source=rss----7b722bfd1b8d---4) 2024-02-12T11:42:13Z **JSON CSRF in Microsoft Bing Maps Collections** ⌘ [Read more](https://infosecwriteups.com/json-csrf-in-microsoft-bing-maps-collections-74afc2b197d5?source=rss----7b722bfd1b8d---4) 2024-02-12T11:41:10Z **Effortless Android Pen Testing on Macbook M1 and M2 (2024)** ⌘ [Read more](https://infosecwriteups.com/effortless-android-pen-testing-on-macbook-m1-and-m2-2024-a1d199aba617?source=rss----7b722bfd1b8d---4) 2024-02-12T11:38:14Z **HTB OSINT Challenge | “Easy Phish”** ⌘ [Read more](https://infosecwriteups.com/htb-osint-challenge-easy-phish-36c3f08a82a4?source=rss----7b722bfd1b8d---4) 2024-02-13T12:41:45Z **How to navigate MITRE ATT&CK®**
[![](https://cdn-images-1.medium.com/max/2600/0*TdnrbkiTGtU5_SDs)](https://infosecwriteups.com/how-to-navigate-mitre-att-ck-292c76ea3e03?source=rss----7b722bfd1b8d---4)

Learn the MITRE ATT&CK framework by yourself!

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-navigate-mitre-att-ck-292c76ea3e03?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/how-to-navigate-mitre-att-ck-292c76ea3e03?source=rss----7b722bfd1b8d---4) 2024-02-14T12:46:35Z **THM — Opacity**
[![](https://cdn-images-1.medium.com/max/2600/0*iTwQcuHxujTnObiZ)](https://infosecwriteups.com/thm-opacity-6e7b487963e0?source=rss----7b722bfd1b8d---4)

Opacity is a Boot2Root made for pentesters and cybersecurity enthusiasts. There are several ways to perform an action; always analyze the…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-opacity-6e7b487963e0?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-opacity-6e7b487963e0?source=rss----7b722bfd1b8d---4) 2024-02-15T12:47:26Z **Can You Skip CISSP to Grow in Cybersecurity?**
[![](https://cdn-images-1.medium.com/max/2600/0*A8_pdGcVdp6-MasE)](https://infosecwriteups.com/can-you-skip-cissp-to-grow-in-cybersecurity-a8df1965ed6f?source=rss----7b722bfd1b8d---4)

Discover why skipping CISSP certification is not an option for cybersecurity professionals aiming to excel in their careers. Dive into our…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/can-you-skip-cis ... ⌘ [Read more](https://infosecwriteups.com/can-you-skip-cissp-to-grow-in-cybersecurity-a8df1965ed6f?source=rss----7b722bfd1b8d---4) 2024-02-17T12:47:26Z **Artificial Intelligence (or) AI: The Most Misused Buzzword of 2024!**
[![](https://cdn-images-1.medium.com/max/2600/0*qMsbXNmGYXSyorQo)](https://infosecwriteups.com/artificial-intelligence-or-ai-the-most-misused-buzzword-of-2024-5c09a8e41929?source=rss----7b722bfd1b8d---4)

AI, AI, AI — Artificial Intelligence is undoubtedly the most misused and misrepresented buzzword of 2024. Let’s see how and why.

[Continue reading on InfoSec Write ... ⌘ [Read more](https://infosecwriteups.com/artificial-intelligence-or-ai-the-most-misused-buzzword-of-2024-5c09a8e41929?source=rss----7b722bfd1b8d---4) 2024-02-18T08:32:01Z **Portswigger — Path Traversal All Labs Walkthrough(Bug Bounty Prep)[by dollarboysushil]** ⌘ [Read more](https://infosecwriteups.com/portswigger-path-traversal-all-labs-walkthrough-bug-bounty-prep-by-dollarboysushil-85ab64d6106a?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:59Z **DLL Side Loading Technique #Threat Hunting & #Adversary Emulation** ⌘ [Read more](https://infosecwriteups.com/dll-side-loading-technique-threat-hunting-adversary-emulation-71d380c07f2c?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:57Z **Key Concepts in Secure Software Development: A Pentester’s Perspective** ⌘ [Read more](https://infosecwriteups.com/key-concepts-in-secure-software-development-a-pentesters-perspective-c117474fa33e?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:55Z **Harnessing Microsoft Copilot as a Cybersecurity Advisor** ⌘ [Read more](https://infosecwriteups.com/harnessing-microsoft-copilot-as-a-cybersecurity-advisor-518c46f697b3?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:53Z **PortSwigger — LAB-5 Web shell upload via obfuscated file extension (Bug Bounty Prep)[by…** ⌘ [Read more](https://infosecwriteups.com/portswigger-lab-5-web-shell-upload-via-obfuscated-file-extension-bug-bounty-prep-by-5232dd3fb8fa?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:27Z **Amazon’s Network Offers Potential For Disaster Response and Military Communications** ⌘ [Read more](https://infosecwriteups.com/amazons-network-offers-potential-for-disaster-response-and-military-communications-b68a847a340c?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:23Z **The UI Slip I Hit 750$: UI Manipulation Leading to Unauthorized Permission Changes** ⌘ [Read more](https://infosecwriteups.com/the-ui-slip-i-hit-750-ui-manipulation-leading-to-unauthorized-permission-changes-d65621d8dd96?source=rss----7b722bfd1b8d---4) 2024-02-18T08:31:20Z **How to learn OWASP for beginners**
[![](https://cdn-images-1.medium.com/max/2600/0*psGk3H6bnamUC_L3)](https://infosecwriteups.com/how-to-learn-owasp-for-beginners-dd971ceb6c11?source=rss----7b722bfd1b8d---4)

Easily learn Open Worldwide Application Security Project.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-learn-owasp-for-beginners-dd971ceb6c11?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/how-to-learn-owasp-for-beginners-dd971ceb6c11?source=rss----7b722bfd1b8d---4) 2024-02-18T12:51:46Z **HTB — Lame**
[![](https://cdn-images-1.medium.com/max/2600/0*W8phJy7pjcsiNvXd)](https://infosecwriteups.com/htb-lame-13b949b481dc?source=rss----7b722bfd1b8d---4)

First box, first own! not so lame now huh?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/htb-lame-13b949b481dc?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/htb-lame-13b949b481dc?source=rss----7b722bfd1b8d---4) 2024-02-19T10:48:55Z **Missed IWCON 2023? Catch Recorded Expert Sessions Here.** ⌘ [Read more](https://infosecwriteups.com/missed-iwcon-2023-catch-recorded-expert-sessions-here-8d62cf34dd37?source=rss----7b722bfd1b8d---4) 2024-02-23T11:51:50Z **Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 2)** ⌘ [Read more](https://infosecwriteups.com/missed-iwcon-2023-catch-recorded-expert-sessions-here-pt-2-27237d02cfbf?source=rss----7b722bfd1b8d---4) 2024-02-25T06:52:25Z **500$ Access Control Bug: Performed Restricted Actions in Developer Settings by low level user.** ⌘ [Read more](https://infosecwriteups.com/500-access-control-bug-performed-restricted-actions-in-developer-settings-by-low-level-user-b4ecaa6d1aa1?source=rss----7b722bfd1b8d---4) 2024-02-25T06:52:23Z **HTB — Jerry**
[![](https://cdn-images-1.medium.com/max/1400/1*f7a-kqPqsNZU5JL7Lm-9wQ.png)](https://infosecwriteups.com/htb-jerry-0947990ec3ca?source=rss----7b722bfd1b8d---4)

What do you say Tom, can you catch me?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/htb-jerry-0947990ec3ca?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/htb-jerry-0947990ec3ca?source=rss----7b722bfd1b8d---4) 2024-02-25T06:52:23Z **PortSwigger — LAB-6 Remote code execution via polyglot web shell upload (Bug Bounty Prep)[by…** ⌘ [Read more](https://infosecwriteups.com/portswigger-lab-6-remote-code-execution-via-polyglot-web-shell-upload-bug-bounty-prep-by-b426b0d50d39?source=rss----7b722bfd1b8d---4) 2024-02-25T06:52:12Z **Exploiting an IDOR that deletes Victim’s job alert** ⌘ [Read more](https://infosecwriteups.com/exploiting-an-idor-that-deletes-victims-job-alert-4386f9a6fb19?source=rss----7b722bfd1b8d---4) 2024-02-25T06:51:09Z **PortSwigger — LAB -4 Web shell upload via extension blacklist bypass (Bug Bounty Prep)[by…** ⌘ [Read more](https://infosecwriteups.com/portswigger-lab-4-web-shell-upload-via-extension-blacklist-bypass-bug-bounty-prep-by-7c6233320f81?source=rss----7b722bfd1b8d---4) 2024-02-25T06:51:08Z **R.U.D.Y Attack: A Masterclass in DDoS Annihilation— “R U Dead Yet?”** ⌘ [Read more](https://infosecwriteups.com/r-u-d-y-attack-a-masterclass-in-ddos-annihilation-r-u-dead-yet-7afa6271a13c?source=rss----7b722bfd1b8d---4) 2024-02-25T06:51:06Z **Unleash the Power of Penetration Testing: How to Install Metasploitable in Kali Linux Easily!**
[![](https://cdn-images-1.medium.com/max/1792/1*wu11Rhg1qyVnQY1XpwAJWw.png)](https://infosecwriteups.com/unleash-the-power-of-penetration-testing-how-to-install-metasploitable-in-kali-linux-easily-9c2ebb458df?source=rss----7b722bfd1b8d---4)

This tutorial is solely for educational purposes. Using penetration testin ... ⌘ [Read more](https://infosecwriteups.com/unleash-the-power-of-penetration-testing-how-to-install-metasploitable-in-kali-linux-easily-9c2ebb458df?source=rss----7b722bfd1b8d---4) 2024-02-25T06:51:04Z **Install Dirsearch on Kali** ⌘ [Read more](https://infosecwriteups.com/install-dirsearch-on-kali-4d5e7096676a?source=rss----7b722bfd1b8d---4) 2024-02-25T06:50:51Z **Portswigger — Command Injection All Labs Walkthrough(Bug Bounty Prep)[by dollarboysushil]** ⌘ [Read more](https://infosecwriteups.com/portswigger-command-injection-all-labs-walkthrough-bug-bounty-prep-by-dollarboysushil-e836421212cf?source=rss----7b722bfd1b8d---4) 2024-02-25T06:50:49Z **Hacking Tools You Should Be Learning in 2024**
[![](https://cdn-images-1.medium.com/max/700/1*HurBMtriksj52X7E7prnhQ.jpeg)](https://infosecwriteups.com/hacking-tools-you-should-be-learning-in-2024-e6875215d4f2?source=rss----7b722bfd1b8d---4)

Hello everyone, today I’ll share important hacking tools you should get familiar with in 2024, especially if you’re kicking off your…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/hacking-to ... ⌘ [Read more](https://infosecwriteups.com/hacking-tools-you-should-be-learning-in-2024-e6875215d4f2?source=rss----7b722bfd1b8d---4) 2024-02-26T11:51:47Z **Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 3)** ⌘ [Read more](https://infosecwriteups.com/missed-iwcon-2023-catch-recorded-expert-sessions-here-pt-3-3d5d626ff90c?source=rss----7b722bfd1b8d---4) 2024-02-27T19:49:13Z **Mastering the eJPTv Certification: Strategies, Insights, and AI Assistance**
[![](https://cdn-images-1.medium.com/max/632/1*w6Z0hsf66gRnAcxYj_vHSA.png)](https://infosecwriteups.com/mastering-the-ejptv-certification-strategies-insights-and-ai-assistance-fcfd0d44392b?source=rss----7b722bfd1b8d---4)

Discover effective strategies, personal insights, and how AI can simplify your journey to passing the eJPTv certification.

[Continu ... ⌘ [Read more](https://infosecwriteups.com/mastering-the-ejptv-certification-strategies-insights-and-ai-assistance-fcfd0d44392b?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:34Z **how i made easy information disclosure bugs in graphql** ⌘ [Read more](https://infosecwriteups.com/how-i-made-easy-information-disclosure-bugs-in-graphql-82284b05d7b4?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:33Z **This is the easiest bug you can find right now.** ⌘ [Read more](https://infosecwriteups.com/this-is-the-easiest-bug-you-can-find-right-now-eb324861c238?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:32Z **bWAPP — HTML Injection — Reflected (URL)** ⌘ [Read more](https://infosecwriteups.com/bwapp-html-injection-reflected-url-5dacf7f6d942?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:30Z **Windows Security: Using AMSI to Analyze Malicious JavaScript** ⌘ [Read more](https://infosecwriteups.com/windows-security-using-amsi-to-analyze-malicious-javascript-c765ec755f40?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:13Z **9.3 Lab: Multi-endpoint race conditions | 2024** ⌘ [Read more](https://infosecwriteups.com/9-3-lab-multi-endpoint-race-conditions-2024-5617e806a0fc?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:11Z **9.2 Lab: Bypassing rate limits via race conditions | 2024** ⌘ [Read more](https://infosecwriteups.com/9-2-lab-bypassing-rate-limits-via-race-conditions-2024-533185d6d94e?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:09Z **9.4 Lab: Single-endpoint race conditions | 2024** ⌘ [Read more](https://infosecwriteups.com/9-4-lab-single-endpoint-race-conditions-2024-40b12d1ae4be?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:07Z **9.5 Lab: Exploiting time-sensitive vulnerabilities | 2024** ⌘ [Read more](https://infosecwriteups.com/9-5-lab-exploiting-time-sensitive-vulnerabilities-2024-d5bf94cdcf59?source=rss----7b722bfd1b8d---4) 2024-02-27T19:46:06Z **Lockbit Ransomware Gang Shutdown by Joint forces and I-Soon leaked**
[![](https://cdn-images-1.medium.com/max/1921/1*sbUWFOjWa1pU0b0TLuDfTA.jpeg)](https://infosecwriteups.com/lockbit-ransomware-gang-shutdown-by-joint-forces-and-i-soon-leaked-8b8cb392f227?source=rss----7b722bfd1b8d---4)

I-Soon, Chinese cyberwarfare tools and targets leaked on Github and Lockbit Group operations seized by law enforcement! This is 2 of the…

[Continue ... ⌘ [Read more](https://infosecwriteups.com/lockbit-ransomware-gang-shutdown-by-joint-forces-and-i-soon-leaked-8b8cb392f227?source=rss----7b722bfd1b8d---4) 2024-02-27T19:57:25Z **Escalation of Windows Privilege: Kernel Exploit.** ⌘ [Read more](https://infosecwriteups.com/escalation-of-windows-privilege-kernel-exploit-bddda00c1ab2?source=rss----7b722bfd1b8d---4) 2024-02-27T19:57:23Z **Mastering ARP Cache Poisoning with Scapy: A Step-by-Step Tutorial**
[![](https://cdn-images-1.medium.com/max/1100/1*yP4x-QD8pw9QjT6_YqRqZg.png)](https://infosecwriteups.com/mastering-arp-cache-poisoning-with-scapy-a-step-by-step-tutorial-bff926773f0a?source=rss----7b722bfd1b8d---4)

Dive into the world of network security with our hands-on guide to ARP cache poisoning using Scapy.

[Continue reading on InfoSec Write-ups »](https://inf ... ⌘ [Read more](https://infosecwriteups.com/mastering-arp-cache-poisoning-with-scapy-a-step-by-step-tutorial-bff926773f0a?source=rss----7b722bfd1b8d---4) 2024-02-27T19:57:12Z **Mastering Samba (SMB) Exploitation: A Comprehensive Pentesting Guide**
[![](https://cdn-images-1.medium.com/max/728/1*ss06W4zazA4X_nDgUgKT-Q.png)](https://infosecwriteups.com/mastering-samba-exploitation-a-comprehensive-pentesting-guide-016ae61c1031?source=rss----7b722bfd1b8d---4)

Dive deep into the world of Samba hacking with this expert guide. From identifying vulnerabilities to practical exploitation techniques…

[Continue reading on ... ⌘ [Read more](https://infosecwriteups.com/mastering-samba-exploitation-a-comprehensive-pentesting-guide-016ae61c1031?source=rss----7b722bfd1b8d---4) 2024-02-27T19:57:11Z **Spoofing User-Agents: A neat trick to outsmart Microsoft** ⌘ [Read more](https://infosecwriteups.com/spoofing-user-agents-a-neat-trick-to-outsmart-microsoft-934cdce1959c?source=rss----7b722bfd1b8d---4) 2024-02-27T19:57:06Z **I took over 10 Million Accounts, Easy API Hacking** ⌘ [Read more](https://infosecwriteups.com/i-took-over-10-million-accounts-easy-api-hacking-89a7092abe40?source=rss----7b722bfd1b8d---4) 2024-02-27T19:56:28Z **The Domino Effect: Strategies to Prevent Supply Chain Cyber Disruptions** ⌘ [Read more](https://infosecwriteups.com/the-domino-effect-strategies-to-prevent-supply-chain-cyber-disruptions-2c6143e20703?source=rss----7b722bfd1b8d---4) 2024-02-27T19:56:25Z **How to Create a Local Kubernetes Cluster: Terraform and Ansible**
[![](https://cdn-images-1.medium.com/max/1200/1*5WpyYWZykHJeQyU539ncJw.jpeg)](https://infosecwriteups.com/how-to-create-a-local-kubernetes-cluster-terraform-and-ansible-44fa9d77a56b?source=rss----7b722bfd1b8d---4)

Learn how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code.

[Continue reading ... ⌘ [Read more](https://infosecwriteups.com/how-to-create-a-local-kubernetes-cluster-terraform-and-ansible-44fa9d77a56b?source=rss----7b722bfd1b8d---4) 2024-02-27T19:56:11Z **From Encryption to Decryption: LockBit Ransomware’s Shutdown**
[![](https://cdn-images-1.medium.com/max/1024/0*riDpCjFvclW-Bdl2)](https://infosecwriteups.com/from-encryption-to-decryption-lockbit-ransomwares-shutdown-a1a8e0453d9c?source=rss----7b722bfd1b8d---4)

TLDR: LockBit ransomware surfaced in 2019, posing a significant threat. However, recent collaborative efforts led by Europol and law…

[Continue reading on InfoSec Write-ups »](http ... ⌘ [Read more](https://infosecwriteups.com/from-encryption-to-decryption-lockbit-ransomwares-shutdown-a1a8e0453d9c?source=rss----7b722bfd1b8d---4) 2024-02-27T19:55:20Z **A Comprehensive Guide on GraphQL Testing** ⌘ [Read more](https://infosecwriteups.com/a-comprehensive-guide-on-graphql-testing-35917bd44807?source=rss----7b722bfd1b8d---4) 2024-02-27T19:54:51Z **Android Hacking: Exploiting Broadcast Receiver**
[![](https://cdn-images-1.medium.com/max/1221/1*t2u7632-FjrZz262sLi30g.png)](https://infosecwriteups.com/android-hacking-exploiting-broadcast-receiver-a0bec16ecc08?source=rss----7b722bfd1b8d---4)

Broadcast Receiver

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/android-hacking-exploiting-broadcast-receiver-a0bec16ecc08?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/android-hacking-exploiting-broadcast-receiver-a0bec16ecc08?source=rss----7b722bfd1b8d---4) 2024-02-28T20:47:33Z **Hack Stories: Hacking Hackers EP:2**
[![](https://cdn-images-1.medium.com/max/2600/0*ikFzeciGomktK0d-)](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-2-b4d2e628781e?source=rss----7b722bfd1b8d---4)

LockBit, Noname57, CyberDragon… Ah The Russians

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-2-b4d2e628781e?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-2-b4d2e628781e?source=rss----7b722bfd1b8d---4) 2024-02-29T11:51:52Z **Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 4)** ⌘ [Read more](https://infosecwriteups.com/missed-iwcon-2023-catch-recorded-expert-sessions-here-pt-4-f15ea9dfa26c?source=rss----7b722bfd1b8d---4) 2024-02-29T20:57:36Z **A Beginner’s Guide to DNS Reconnaissance (Part 1)** ⌘ [Read more](https://infosecwriteups.com/a-beginners-guide-to-dns-reconnaissance-part-1-6cd9f502db7d?source=rss----7b722bfd1b8d---4) 2024-03-01T20:57:38Z **10 DNS Enumeration Tips & Tricks** ⌘ [Read more](https://infosecwriteups.com/10-dns-enumeration-tips-tricks-f33c94e32d8e?source=rss----7b722bfd1b8d---4) 2024-03-02T20:57:36Z **3 Mistakes Every Beginner Ethical Hacker Makes** ⌘ [Read more](https://infosecwriteups.com/3-mistakes-every-beginner-ethical-hacker-makes-f86fa5ee96c9?source=rss----7b722bfd1b8d---4) 2024-03-03T11:57:34Z **Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 5)** ⌘ [Read more](https://infosecwriteups.com/missed-iwcon-2023-catch-recorded-expert-sessions-here-pt-5-927ce9dab342?source=rss----7b722bfd1b8d---4) 2024-03-04T05:25:54Z **How to Disappear Online: A Step-by-Step Guide to Becoming a Digital Ghost**
[![](https://cdn-images-1.medium.com/max/1792/1*VesXY3gaklyj6DvFLUFNdQ.png)](https://infosecwriteups.com/how-to-disappear-online-a-step-by-step-guide-to-becoming-a-digital-ghost-d5eb2fa716a2?source=rss----7b722bfd1b8d---4)

This guide is for educational purposes only. Always follow the laws in your jurisdiction

[Continue reading on InfoSec Write-ups » ... ⌘ [Read more](https://infosecwriteups.com/how-to-disappear-online-a-step-by-step-guide-to-becoming-a-digital-ghost-d5eb2fa716a2?source=rss----7b722bfd1b8d---4) 2024-03-04T05:25:48Z **PenTestGPT: The Future of Automated Penetration Testing ?**
[![](https://cdn-images-1.medium.com/max/1600/1*S1ktZoRb-BgIgiai9JFC6w.jpeg)](https://infosecwriteups.com/pentestgpt-the-future-of-automated-penetration-testing-be8092335ce1?source=rss----7b722bfd1b8d---4)

Discover how PenTestGPT revolutionizes cybersecurity through automated penetration testing, leveraging ChatGPT’s power for enhanced…

[Continue reading on InfoSec Write-ups »](https ... ⌘ [Read more](https://infosecwriteups.com/pentestgpt-the-future-of-automated-penetration-testing-be8092335ce1?source=rss----7b722bfd1b8d---4) 2024-03-04T05:25:35Z **Revolutionizing Network Protocol Testing: A New Era of Validation**
[![](https://cdn-images-1.medium.com/max/1642/1*j3AXf9xHeJ04Km6C4v0ALA.jpeg)](https://infosecwriteups.com/revolutionizing-network-protocol-testing-a-new-era-of-validation-4eec55782e07?source=rss----7b722bfd1b8d---4)

“Towards verification of QUIC and its extensions”

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/revolutionizing-network-protocol ... ⌘ [Read more](https://infosecwriteups.com/revolutionizing-network-protocol-testing-a-new-era-of-validation-4eec55782e07?source=rss----7b722bfd1b8d---4) 2024-03-04T05:25:15Z **11.5 Lab: Exploiting blind XXE to exfiltrate data using a malicious external DTD | 2024** ⌘ [Read more](https://infosecwriteups.com/11-5-lab-exploiting-blind-xxe-to-exfiltrate-data-using-a-malicious-external-dtd-2024-a0cc2615cd5e?source=rss----7b722bfd1b8d---4) 2024-03-04T05:24:44Z **HackerGPT: The Cool AI Hacker Buddy Every Cyber Pro Needs ?**
[![](https://cdn-images-1.medium.com/max/761/1*hh2M1Q_9uf7UCyLnZq2_xg.png)](https://infosecwriteups.com/hackergpt-the-cool-ai-hacker-buddy-every-cyber-pro-needs-fdab6768c2bf?source=rss----7b722bfd1b8d---4)

Dive into the world of HackerGPT, your next AI sidekick in cybersecurity. Discover how it’s changing the game for hackers and security…

[Continue reading on InfoSec Write-ups » ... ⌘ [Read more](https://infosecwriteups.com/hackergpt-the-cool-ai-hacker-buddy-every-cyber-pro-needs-fdab6768c2bf?source=rss----7b722bfd1b8d---4) 2024-03-04T05:24:28Z **ISO 27001 Essentials: Protecting Your Digital Assets** ⌘ [Read more](https://infosecwriteups.com/iso-27001-essentials-protecting-your-digital-assets-924111a9d0c6?source=rss----7b722bfd1b8d---4) 2024-03-04T05:23:49Z **From Recon to Crack: Navigating Password Hacking with CUPP, Sherlock & Hydra**
[![](https://cdn-images-1.medium.com/max/600/1*6l988iYopS3o3h4WlQqPSw.png)](https://infosecwriteups.com/from-recon-to-crack-navigating-password-hacking-with-cupp-sherlock-hydra-46d9ad76118d?source=rss----7b722bfd1b8d---4)

Unlock the secrets of CUPP, the go-to tool for generating personalized wordlists for password cracking. Learn how to use CUPP to ... ⌘ [Read more](https://infosecwriteups.com/from-recon-to-crack-navigating-password-hacking-with-cupp-sherlock-hydra-46d9ad76118d?source=rss----7b722bfd1b8d---4) 2024-03-04T05:23:09Z **bersecurity11.6 Lab: Exploiting blind XXE to retrieve data via error messages | 2024** ⌘ [Read more](https://infosecwriteups.com/bersecurity11-6-lab-exploiting-blind-xxe-to-retrieve-data-via-error-messages-2024-4b7f1340195a?source=rss----7b722bfd1b8d---4) 2024-03-04T05:22:59Z **BYPASSING PAYMENTS IN APPLE FOR FREE TRAILS FOR LIFETIME** ⌘ [Read more](https://infosecwriteups.com/bypassing-payments-in-apple-for-free-trails-for-lifetime-8e3019dfe57b?source=rss----7b722bfd1b8d---4) 2024-03-04T05:22:40Z **10.4 Lab: SSRF with filter bypass via open redirection vulnerability | 2024** ⌘ [Read more](https://infosecwriteups.com/10-4-lab-ssrf-with-filter-bypass-via-open-redirection-vulnerability-2024-fa36d8f10968?source=rss----7b722bfd1b8d---4) 2024-03-05T06:26:36Z **How I Found Multiple XSS Vulnerabilities Using Unknown Techniques** ⌘ [Read more](https://infosecwriteups.com/how-i-found-multiple-xss-vulnerabilities-using-unknown-techniques-74f8e705ea0d?source=rss----7b722bfd1b8d---4) 2024-03-06T06:26:28Z **SANS Offensive CTF - Taskist:: 01–04** ⌘ [Read more](https://infosecwriteups.com/sans-offensive-ctf-taskist-01-04-56452aa43905?source=rss----7b722bfd1b8d---4) 2024-03-15T12:40:53Z **My Report Summaries #1: Project manager can see & download all users’ login history at redacted app…** ⌘ [Read more](https://infosecwriteups.com/my-report-summaries-1-project-manager-can-see-download-all-users-login-history-at-redacted-app-6a41597b5d11?source=rss----7b722bfd1b8d---4) 2024-03-15T12:40:46Z **SANS Offensive CTF — JavaScript☕::001–004** ⌘ [Read more](https://infosecwriteups.com/sans-offensive-ctf-javascript-001-004-8737ad95c617?source=rss----7b722bfd1b8d---4) 2024-03-15T12:54:37Z **Story of Lock up users’ account by DOS attack cost $1,100** ⌘ [Read more](https://infosecwriteups.com/story-of-lock-up-users-account-by-dos-attack-cost-1-100-87b47d06a7c1?source=rss----7b722bfd1b8d---4) 2024-03-15T12:54:33Z **Practical Exploitation of XXE(CVE-2018–8033) and Mitigating in Apache OFBiz** ⌘ [Read more](https://infosecwriteups.com/practical-exploitation-of-xxe-cve-2018-8033-and-mitigating-in-apache-ofbiz-56ae8233c2b4?source=rss----7b722bfd1b8d---4) 2024-03-15T12:54:24Z **PwnAdventure: A Unique Blend of MMORPG and Cybersecurity Training**
[![](https://cdn-images-1.medium.com/max/845/1*Wdn3PzJewDSIBmzXtmxxnw.jpeg)](https://infosecwriteups.com/pwnadventure-a-unique-blend-of-mmorpg-and-cybersecurity-training-ed7003f1dc63?source=rss----7b722bfd1b8d---4)

Dive into the world of PwnAdventure, an intentionally vulnerable MMORPG designed to challenge cybersecurity enthusiasts and educate game…

[Continue readi ... ⌘ [Read more](https://infosecwriteups.com/pwnadventure-a-unique-blend-of-mmorpg-and-cybersecurity-training-ed7003f1dc63?source=rss----7b722bfd1b8d---4) 2024-03-15T12:54:16Z **How North Korean Hackers Are Robbing Millions from Banks** ⌘ [Read more](https://infosecwriteups.com/how-north-korean-hackers-are-robbing-millions-from-banks-1487ffac83c9?source=rss----7b722bfd1b8d---4) 2024-03-15T12:53:24Z **MRS #2: Bypassing premium features by checking “premium validation” parameters (€€€)** ⌘ [Read more](https://infosecwriteups.com/mrs-2-bypassing-premium-features-by-checking-premium-validation-parameters-f2e211fad160?source=rss----7b722bfd1b8d---4) 2024-03-15T12:52:40Z **User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.** ⌘ [Read more](https://infosecwriteups.com/user-enumeration-techniques-and-tactics-in-an-active-directory-pentesting-engagement-c634bf241017?source=rss----7b722bfd1b8d---4) 2024-03-15T12:51:57Z **LLM AI Security Checklist** ⌘ [Read more](https://infosecwriteups.com/llm-ai-security-checklist-06ce587d42fa?source=rss----7b722bfd1b8d---4) 2024-03-15T12:51:55Z **Mastering WordPress Penetration Testing: A Step-by-Step Guide** ⌘ [Read more](https://infosecwriteups.com/mastering-wordpress-penetration-testing-a-step-by-step-guide-d99a06487486?source=rss----7b722bfd1b8d---4) 2024-03-15T12:50:17Z **$600 Simple MFA Bypass — Graphql** ⌘ [Read more](https://infosecwriteups.com/600-simple-mfa-bypass-graphql-b46c6a4c5b82?source=rss----7b722bfd1b8d---4) 2024-03-15T12:50:13Z **Mastering Scapy for Network Security: A Hands-On Guide to Scanning and DNS Reflection**
[![](https://cdn-images-1.medium.com/max/1280/1*FrsqO_xfyWzx7cqxd6Mkzw.png)](https://infosecwriteups.com/mastering-scapy-for-network-security-a-hands-on-guide-to-scanning-and-dns-reflection-ce7fbf6f463f?source=rss----7b722bfd1b8d---4)

Dive into the world of network security with our hands-on guide to using Scapy for scanning an ... ⌘ [Read more](https://infosecwriteups.com/mastering-scapy-for-network-security-a-hands-on-guide-to-scanning-and-dns-reflection-ce7fbf6f463f?source=rss----7b722bfd1b8d---4) 2024-03-16T13:46:31Z **Penetration Testing Microsoft Copilot 365**
[![](https://cdn-images-1.medium.com/max/1020/1*3Q9JE1-VQDV-DIGxI0gLbA.jpeg)](https://infosecwriteups.com/penetration-testing-microsoft-copilot-365-910301660dac?source=rss----7b722bfd1b8d---4)

Using Automated Prompts to Discover Sensitive Data

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/penetration-testing-microsoft-copilot-365-910301660dac?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/penetration-testing-microsoft-copilot-365-910301660dac?source=rss----7b722bfd1b8d---4) 2024-03-17T13:52:32Z **HTB — Netmon**
[![](https://cdn-images-1.medium.com/max/2600/0*L5OXrQxvMnU8Tr5a)](https://infosecwriteups.com/htb-netmon-5951e2a46486?source=rss----7b722bfd1b8d---4)

Default creds for the win!

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/htb-netmon-5951e2a46486?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/htb-netmon-5951e2a46486?source=rss----7b722bfd1b8d---4) 2024-03-18T17:58:17Z **4 Ways Cybercrime Could Impact Your Loan Business** ⌘ [Read more](https://infosecwriteups.com/4-ways-cybercrime-could-impact-your-loan-business-25076a810a77?source=rss----7b722bfd1b8d---4) 2024-03-29T03:26:09Z **Find Blind XSS like a pro.** ⌘ [Read more](https://infosecwriteups.com/find-blind-xss-like-a-pro-470be7cd8a08?source=rss----7b722bfd1b8d---4) 2024-03-29T03:25:47Z **13.12 Lab: Reflected DOM XSS — Cross Site Scripting | 2024** ⌘ [Read more](https://infosecwriteups.com/13-12-lab-reflected-dom-xss-cross-site-scripting-2024-0dc98e91ae42?source=rss----7b722bfd1b8d---4) 2024-03-29T03:25:45Z **Exploring the PinePhone: A Tech Enthusiast’s Dream for Privacy and Hacking**
[![](https://cdn-images-1.medium.com/max/1200/1*70zW_9jlhBYlZJtifOE-ng.jpeg)](https://infosecwriteups.com/exploring-the-pinephone-a-tech-enthusiasts-dream-for-privacy-and-customization-c892f7b4049e?source=rss----7b722bfd1b8d---4)

From Unboxing to Unique Use Cases: My Journey with the PinePhone and How It Stacks Up Against the FlipperZero

[Cont ... ⌘ [Read more](https://infosecwriteups.com/exploring-the-pinephone-a-tech-enthusiasts-dream-for-privacy-and-customization-c892f7b4049e?source=rss----7b722bfd1b8d---4) 2024-03-29T03:25:32Z **TryHackMe writeup: Digital Forensics Case B4DM755**
[![](https://cdn-images-1.medium.com/max/706/1*OzqoMGfsCs_m1obUhdIFDQ.png)](https://infosecwriteups.com/tryhackme-writeup-digital-forensics-case-b4dm755-e196e00eae9a?source=rss----7b722bfd1b8d---4)

In this writeup, I play the role as first responder, and investigate the possible theft of a company’s software product.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/tryhackme-w ... ⌘ [Read more](https://infosecwriteups.com/tryhackme-writeup-digital-forensics-case-b4dm755-e196e00eae9a?source=rss----7b722bfd1b8d---4) 2024-03-29T03:24:10Z **All about Ethical Hacking** ⌘ [Read more](https://infosecwriteups.com/all-about-ethical-hacking-277b9c3e4b36?source=rss----7b722bfd1b8d---4) 2024-03-29T03:37:25Z **Vuln-web-lab** ⌘ [Read more](https://infosecwriteups.com/vuln-web-lab-3d35b4cee70b?source=rss----7b722bfd1b8d---4) 2024-03-29T03:36:39Z **Shodan - “Unauthorized access to setup panel”** ⌘ [Read more](https://infosecwriteups.com/shodan-power-unauthorized-access-to-setup-panel-c64bd63f9b3e?source=rss----7b722bfd1b8d---4) 2024-03-29T03:35:48Z **TCS HACKQUEST SEASON 8 EXPERIENCE** ⌘ [Read more](https://infosecwriteups.com/tcs-hackquest-season-8-experience-8643bc6d86ee?source=rss----7b722bfd1b8d---4) 2024-03-29T03:35:46Z **HTB Cyber Apocalypse CTF 2024 — Misc** ⌘ [Read more](https://infosecwriteups.com/htb-cyber-apocalypse-ctf-2024-misc-9d3d512900b4?source=rss----7b722bfd1b8d---4) 2024-03-29T03:35:44Z **HTB Cyber Apocalypse CTF 2024 — Forensics** ⌘ [Read more](https://infosecwriteups.com/htb-cyber-apocalypse-ctf-2024-forensics-16f4c9af5c47?source=rss----7b722bfd1b8d---4) 2024-03-29T03:35:11Z **Finding the hidden function led to a $300 IDOR** ⌘ [Read more](https://infosecwriteups.com/finding-the-hidden-function-led-to-a-300-idor-d37219c66d03?source=rss----7b722bfd1b8d---4) 2024-03-29T03:34:12Z **The Ultimate Guide to Red Teaming: Inside “A-poc/RedTeam-Tools”**
[![](https://cdn-images-1.medium.com/max/2120/1*FROyjkreTJfYoGGn3Kf3gQ.png)](https://infosecwriteups.com/the-ultimate-guide-to-red-teaming-inside-a-poc-redteam-tools-69645572cf0f?source=rss----7b722bfd1b8d---4)

Explore the comprehensive toolkit of over 130+ resources for red teaming activities in the A-poc/RedTeam-Tools GitHub repository. From…

[Continue reading on InfoSe ... ⌘ [Read more](https://infosecwriteups.com/the-ultimate-guide-to-red-teaming-inside-a-poc-redteam-tools-69645572cf0f?source=rss----7b722bfd1b8d---4) 2024-03-29T04:56:33Z **THM — Expose**
[![](https://cdn-images-1.medium.com/max/2600/0*gyIRk5R4R8ImCTqj)](https://infosecwriteups.com/thm-expose-4ceca4bcbd53?source=rss----7b722bfd1b8d---4)

Is this the right admin page?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-expose-4ceca4bcbd53?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-expose-4ceca4bcbd53?source=rss----7b722bfd1b8d---4) 2024-03-29T04:50:57Z **[Account Take Over] through reset password token leaked in response, 2500 € Reward** ⌘ [Read more](https://infosecwriteups.com/account-take-over-through-reset-password-token-leaked-in-response-2500-reward-b643f97a7c67?source=rss----7b722bfd1b8d---4) 2024-03-29T04:50:55Z **HTB Cyber Apocalypse CTF 2024 — Reversing** ⌘ [Read more](https://infosecwriteups.com/htb-cyber-apocalypse-ctf-2024-reversing-d9eb85c59ca9?source=rss----7b722bfd1b8d---4) 2024-03-29T04:50:38Z **HTB Cyber Apocalypse CTF 2024 — Web** ⌘ [Read more](https://infosecwriteups.com/htb-cyber-apocalypse-ctf-2024-web-50b31126de50?source=rss----7b722bfd1b8d---4) 2024-03-29T04:50:36Z **DEVIN AI Is Just The start — Why Cybersecurity Professionals Should be VERY Worried**
[![](https://cdn-images-1.medium.com/max/2600/0*jYix-4VIB8gYQ0O4)](https://infosecwriteups.com/devin-ai-is-just-the-start-why-cybersecurity-professionals-should-be-very-worried-d0a1a4fe563c?source=rss----7b722bfd1b8d---4)

Are “AI Developers” the next big compromise in the Software Supply Chain ?

[Continue reading on InfoSec Write-u ... ⌘ [Read more](https://infosecwriteups.com/devin-ai-is-just-the-start-why-cybersecurity-professionals-should-be-very-worried-d0a1a4fe563c?source=rss----7b722bfd1b8d---4) 2024-03-29T04:50:30Z **HTB Cyber Apocalypse CTF 2024 Write-ups** ⌘ [Read more](https://infosecwriteups.com/htb-cyber-apocalypse-ctf-2024-write-ups-95246e14ac48?source=rss----7b722bfd1b8d---4) 2024-03-29T04:49:57Z **MAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORY** ⌘ [Read more](https://infosecwriteups.com/man-in-the-middle-attacks-mitm-listen-and-relay-attacks-in-windows-active-directory-9315d39c845f?source=rss----7b722bfd1b8d---4) 2024-03-29T04:49:52Z **Your Crypto Wallets/Currency, is NOT Safe from Hackers & How to Secure It!** ⌘ [Read more](https://infosecwriteups.com/your-crypto-wallets-currency-is-not-safe-from-hackers-how-to-secure-it-9abd3ec5fa1?source=rss----7b722bfd1b8d---4) 2024-03-29T04:49:42Z **HTB Cyber Apocalypse CTF 2024 — Hardware** ⌘ [Read more](https://infosecwriteups.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b?source=rss----7b722bfd1b8d---4) 2024-03-29T04:49:35Z **Mastering Linux Permissions: A Cybersecurity Essential**
[![](https://cdn-images-1.medium.com/max/636/1*wt6W_okmsPsP0Q23gjTcgQ.png)](https://infosecwriteups.com/mastering-linux-permissions-a-cybersecurity-essential-a35da66bbf82?source=rss----7b722bfd1b8d---4)

Dive into the world of Linux permissions with our step-by-step tutorial.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/mastering-linux-permissions-a-cybersecurity- ... ⌘ [Read more](https://infosecwriteups.com/mastering-linux-permissions-a-cybersecurity-essential-a35da66bbf82?source=rss----7b722bfd1b8d---4) 2024-03-30T06:01:56Z **HTB — Active**
[![](https://cdn-images-1.medium.com/max/2600/0*sNH4gqMU4gKsSVrU)](https://infosecwriteups.com/htb-active-d9fed1c4da72?source=rss----7b722bfd1b8d---4)

Always be vigilant!

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/htb-active-d9fed1c4da72?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/htb-active-d9fed1c4da72?source=rss----7b722bfd1b8d---4) 2024-04-05T02:27:34Z **Skyrocket Your Bug Bounty Success Using These Crawlers** ⌘ [Read more](https://infosecwriteups.com/skyrocket-your-bug-bounty-success-using-these-crawlers-03ce28efb498?source=rss----7b722bfd1b8d---4) 2024-04-05T02:26:17Z **Exploiting Language Models (LLM) with “Virtual Prompt Injection” (VPI)**
[![](https://cdn-images-1.medium.com/max/2600/1*YpwhHq1V-NpOqIRigDcb1w.png)](https://infosecwriteups.com/exploiting-language-models-llm-with-virtual-prompt-injection-vpi-c5d2fe5a6439?source=rss----7b722bfd1b8d---4)

Dive into the world of cybersecurity as we unravel the concept of Virtual Prompt Injection (VPI) and its impact on the integrity of…

[Continue readi ... ⌘ [Read more](https://infosecwriteups.com/exploiting-language-models-llm-with-virtual-prompt-injection-vpi-c5d2fe5a6439?source=rss----7b722bfd1b8d---4) 2024-04-05T02:26:04Z **What happens when a DNS request is made?** ⌘ [Read more](https://infosecwriteups.com/what-happens-when-a-dns-request-is-made-10f26c5501f9?source=rss----7b722bfd1b8d---4) 2024-04-05T02:25:47Z **Comprehensive Guide to AWS WAF — Protecting Web Applications** ⌘ [Read more](https://infosecwriteups.com/comprehensive-guide-to-aws-waf-protecting-web-applications-23846e4a59ed?source=rss----7b722bfd1b8d---4) 2024-04-08T04:23:44Z **The Power of Open Source Intelligence | OSINT | CTF Newbies** ⌘ [Read more](https://infosecwriteups.com/the-power-of-open-source-intelligence-osint-ctf-newbies-b39db0421dd4?source=rss----7b722bfd1b8d---4) 2024-04-08T04:23:25Z **Decoding the Web: Exploring the Depths of Exploitation | CTF Newbies** ⌘ [Read more](https://infosecwriteups.com/decoding-the-web-exploring-the-depths-of-exploitation-ctf-newbies-233293a2a739?source=rss----7b722bfd1b8d---4) 2024-04-08T04:23:15Z **Breaking the Light Speed Barrier: The Revolutionary FLIP Protocol Unveiled**
[![](https://cdn-images-1.medium.com/max/600/1*JDTAOcw5oNQHx5vX71iYKw.gif)](https://infosecwriteups.com/breaking-the-light-speed-barrier-the-revolutionary-flip-protocol-unveiled-7c4538c7651e?source=rss----7b722bfd1b8d---4)

Dive into the Faster than Light Speed Protocol (FLIP) — an April Fool’s exploration into how AI might predict and deliver intern ... ⌘ [Read more](https://infosecwriteups.com/breaking-the-light-speed-barrier-the-revolutionary-flip-protocol-unveiled-7c4538c7651e?source=rss----7b722bfd1b8d---4) 2024-04-08T04:23:04Z **Securing LLM-Based Systems with SecGPT: A Dive into Its Purpose-Driven Architecture**
[![](https://cdn-images-1.medium.com/max/647/1*qcrzC19dE1_3PUjzRAI-1A.png)](https://infosecwriteups.com/securing-llm-based-systems-with-secgpt-a-dive-into-its-purpose-driven-architecture-4407a7f49007?source=rss----7b722bfd1b8d---4)

Explore how SecGPT, an innovative execution isolation architecture for LLM-based systems, enhances cy ... ⌘ [Read more](https://infosecwriteups.com/securing-llm-based-systems-with-secgpt-a-dive-into-its-purpose-driven-architecture-4407a7f49007?source=rss----7b722bfd1b8d---4) 2024-04-08T04:22:54Z **VulnHub - Kioptrix: Level 4 (1.3) (#4)** ⌘ [Read more](https://infosecwriteups.com/vulnhub-kioptrix-level-4-1-3-4-ad25b000b058?source=rss----7b722bfd1b8d---4) 2024-04-08T04:22:48Z **picoCTF 2024 — Write-up — Forensics** ⌘ [Read more](https://infosecwriteups.com/picoctf-2024-write-up-forensics-c471e79e6af9?source=rss----7b722bfd1b8d---4) 2024-04-08T04:22:24Z **How I hacked Biometric machine just by using a calculator** ⌘ [Read more](https://infosecwriteups.com/how-i-hacked-biometric-machine-just-by-using-a-calculator-794e4254cedb?source=rss----7b722bfd1b8d---4) 2024-04-08T04:22:00Z **How to Automatically Deploy a Malware Analysis Environment**
[![](https://cdn-images-1.medium.com/max/1200/1*3PHdCc8ssZepFn8-VnQyzA.jpeg)](https://infosecwriteups.com/how-to-automatically-deploy-a-malware-analysis-environment-47258fb7aeb1?source=rss----7b722bfd1b8d---4)

Discover how to create your own automated malware analysis environment you can deploy in minutes in this hands-on guide.

[Continue reading on InfoSec Write-ups »](https:// ... ⌘ [Read more](https://infosecwriteups.com/how-to-automatically-deploy-a-malware-analysis-environment-47258fb7aeb1?source=rss----7b722bfd1b8d---4) 2024-04-08T04:21:37Z **How to start Bug Bounty Hunting $$$$ in 2024?? | A short RoadMap** ⌘ [Read more](https://infosecwriteups.com/how-to-start-bug-bounty-hunting-in-2024-a-short-roadmap-9f9eeddd24ca?source=rss----7b722bfd1b8d---4) 2024-04-08T04:21:26Z **Shield your System — XZ Utils Backdoor (Linux Distribution)** ⌘ [Read more](https://infosecwriteups.com/shield-your-system-xz-utils-backdoor-linux-distribution-54583b071ccc?source=rss----7b722bfd1b8d---4) 2024-04-09T05:16:51Z **Designing Micro-Segmentation for Enhanced Security with Jump Hosts** ⌘ [Read more](https://infosecwriteups.com/designing-micro-segmentation-for-enhanced-security-with-jump-hosts-1ee6b31f6d03?source=rss----7b722bfd1b8d---4) 2024-04-10T05:22:51Z **Roadmap to ISO 27001**
[![](https://cdn-images-1.medium.com/max/1168/0*Gj2kmFst-V49v5aG.jpg)](https://infosecwriteups.com/roadmap-to-iso-27001-8a94188e9ec5?source=rss----7b722bfd1b8d---4)

Your Comprehensive Guide to Information Security Management

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/roadmap-to-iso-27001-8a94188e9ec5?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/roadmap-to-iso-27001-8a94188e9ec5?source=rss----7b722bfd1b8d---4) 2024-04-11T05:22:02Z **THM — Grep**
[![](https://cdn-images-1.medium.com/max/2600/0*7zY-WIvGYzW_LIzx)](https://infosecwriteups.com/thm-grep-f360bbc9fb24?source=rss----7b722bfd1b8d---4)

Recon squat move out!

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-grep-f360bbc9fb24?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-grep-f360bbc9fb24?source=rss----7b722bfd1b8d---4) 2024-04-12T02:54:21Z **Mastering Linux Commands: A Complete Guide for Beginners**
[![](https://cdn-images-1.medium.com/max/2000/1*fWdd1my55-GwsLYKpfdFlg.jpeg)](https://infosecwriteups.com/mastering-linux-commands-a-complete-guide-for-beginners-dd5fb2bb2a7d?source=rss----7b722bfd1b8d---4)

Unlock the full potential of Linux with our step-by-step tutorial on essential commands. Perfect for beginners looking to navigate Linux…

[Continue reading on InfoSec Write-ups »] ... ⌘ [Read more](https://infosecwriteups.com/mastering-linux-commands-a-complete-guide-for-beginners-dd5fb2bb2a7d?source=rss----7b722bfd1b8d---4) 2024-04-12T02:52:21Z **Cybersecurity 2024: How to Secure an Entry-Level Job as a Hacker!** ⌘ [Read more](https://infosecwriteups.com/cybersecurity-2024-how-to-secure-an-entry-level-job-as-a-hacker-05926a08aa24?source=rss----7b722bfd1b8d---4) 2024-04-12T02:52:05Z **Step by Step Complete Beginners guide of iOS penetration testing with corellium** ⌘ [Read more](https://infosecwriteups.com/step-by-step-complete-beginners-guide-of-ios-penetration-testing-with-corellium-2b9e9c6382c2?source=rss----7b722bfd1b8d---4) 2024-04-12T03:01:13Z **What is the effectiveness of bombarding sites?** ⌘ [Read more](https://infosecwriteups.com/what-is-the-effectiveness-of-bombarding-sites-f7308c094e9b?source=rss----7b722bfd1b8d---4) 2024-04-12T03:00:36Z **Unlocking with Cryptography | CTF Newbies** ⌘ [Read more](https://infosecwriteups.com/unlocking-with-cryptography-ctf-newbies-bbe042dc97e4?source=rss----7b722bfd1b8d---4) 2024-04-12T03:00:21Z **CVE-2024–24576: A Critical Rust Vulnerability on Windows**
[![](https://cdn-images-1.medium.com/max/1600/1*Id-cpoX5hCMvnCbrFdGSYw.png)](https://infosecwriteups.com/cve-2024-24576-a-critical-rust-vulnerability-on-windows-4f0bb1a332e9?source=rss----7b722bfd1b8d---4)

Dive into the technical intricacies of CVE-2024–24576, a critical vulnerability in the Rust programming language that compromises Windows…

[Continue reading on InfoSec Write-ups »] ... ⌘ [Read more](https://infosecwriteups.com/cve-2024-24576-a-critical-rust-vulnerability-on-windows-4f0bb1a332e9?source=rss----7b722bfd1b8d---4) 2024-04-12T03:36:05Z **Exploiting Generative AI Apps With Prompt Injection** ⌘ [Read more](https://infosecwriteups.com/exploiting-generative-ai-apps-with-prompt-injection-33b0ff1aa07a?source=rss----7b722bfd1b8d---4) 2024-04-12T03:35:04Z **Why you should care about the xz exploit**
[![](https://cdn-images-1.medium.com/max/2600/0*ZjbYeyGteoH7zzi4)](https://infosecwriteups.com/why-you-should-care-about-the-xz-exploit-7144ca210160?source=rss----7b722bfd1b8d---4)

The greatest backdoor there never was: CVE-2024–3094

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/why-you-should-care-about-the-xz-exploit-7144ca210160?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/why-you-should-care-about-the-xz-exploit-7144ca210160?source=rss----7b722bfd1b8d---4) 2024-04-12T03:34:52Z **How I Hacked Your Private Repository in GitHub (And Got JackShit)** ⌘ [Read more](https://infosecwriteups.com/how-i-hacked-your-private-repository-in-github-and-got-jackshit-cb7c342570b2?source=rss----7b722bfd1b8d---4) 2024-04-12T05:22:52Z **Demystifying Array Injections** ⌘ [Read more](https://infosecwriteups.com/demystifying-array-injections-934042f50132?source=rss----7b722bfd1b8d---4) 2024-04-13T03:56:51Z **TryHackMe CTF Collection Vol. 2** ⌘ [Read more](https://infosecwriteups.com/tryhackme-ctf-collection-vol-2-e570d487ebc3?source=rss----7b722bfd1b8d---4) 2024-04-13T05:22:05Z **Hijacking your JavaScript using prototype pollution** ⌘ [Read more](https://infosecwriteups.com/hijacking-your-javascript-using-prototype-pollution-8caeac16b13f?source=rss----7b722bfd1b8d---4) 2024-04-13T15:57:07Z **Enhancing Digital Security: Strategies for Secret Detection and Management** ⌘ [Read more](https://infosecwriteups.com/enhancing-digital-security-strategies-for-secret-detection-and-management-f3c543c7e25c?source=rss----7b722bfd1b8d---4) 2024-04-14T03:57:05Z **XZ Backdoor —  Breaching Trust in Open-Source Collaborative Development** ⌘ [Read more](https://infosecwriteups.com/xz-backdoor-breaching-trust-in-open-source-collaborative-development-4b6510629b03?source=rss----7b722bfd1b8d---4) 2024-04-14T15:57:06Z **HTB — Bashed**
[![](https://cdn-images-1.medium.com/max/2600/0*VQ4uzIOV-wGlr8M6)](https://infosecwriteups.com/htb-bashed-2e7c3915c81e?source=rss----7b722bfd1b8d---4)

Bash your way through!

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/htb-bashed-2e7c3915c81e?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/htb-bashed-2e7c3915c81e?source=rss----7b722bfd1b8d---4) 2024-04-15T03:57:10Z **HTB CTF: Cracking Passwords with Hashcat** ⌘ [Read more](https://infosecwriteups.com/htb-ctf-cracking-passwords-with-hashcat-6a932514e5c8?source=rss----7b722bfd1b8d---4) 2024-04-17T17:35:57Z **Turning Wayback Machine Into GOLD MINING MACHINE** ⌘ [Read more](https://infosecwriteups.com/turning-wayback-machine-into-gold-mining-machine-dcca31ee4114?source=rss----7b722bfd1b8d---4) 2024-04-17T17:30:11Z **Acoustic Side Channel Attacks on Keyboards: A Deep Dive into Typing Patterns and Security…**
[![](https://cdn-images-1.medium.com/max/2600/1*jh9gfLneQloSqiy_wz9ftQ.png)](https://infosecwriteups.com/acoustic-side-channel-attacks-on-keyboards-a-deep-dive-into-typing-patterns-and-security-8b6eb198f655?source=rss----7b722bfd1b8d---4)

Discover how acoustic side channel attacks utilize keyboard typing patterns to br ... ⌘ [Read more](https://infosecwriteups.com/acoustic-side-channel-attacks-on-keyboards-a-deep-dive-into-typing-patterns-and-security-8b6eb198f655?source=rss----7b722bfd1b8d---4) 2024-04-17T17:29:51Z **The Impact of Cyberattacks on Brand Reputation: How to Minimise Damage** ⌘ [Read more](https://infosecwriteups.com/the-impact-of-cyberattacks-on-brand-reputation-how-to-minimise-damage-fc50d0eb7b12?source=rss----7b722bfd1b8d---4) 2024-04-17T17:29:28Z **Investigating The Files With Forensics | CTF Newbies** ⌘ [Read more](https://infosecwriteups.com/investigating-the-files-with-forensics-ctf-newbies-69dfa8cd25f4?source=rss----7b722bfd1b8d---4) 2024-04-17T17:29:23Z **My Journey with CRTO: A Review** ⌘ [Read more](https://infosecwriteups.com/my-journey-with-crto-a-review-b6fc36134f4d?source=rss----7b722bfd1b8d---4) 2024-04-17T17:29:18Z **Ultimate Guide to OWASP Top 10:2021** ⌘ [Read more](https://infosecwriteups.com/unofficial-guide-to-owasp-top-10-2021-87eebd03b614?source=rss----7b722bfd1b8d---4) 2024-04-17T17:29:11Z **Lacerating through SQL Injections** ⌘ [Read more](https://infosecwriteups.com/lacerating-through-sql-injections-806f62cc2fe1?source=rss----7b722bfd1b8d---4) 2024-04-17T17:29:02Z **Using Generative AI to Predict Cyberattacks** ⌘ [Read more](https://infosecwriteups.com/using-generative-ai-to-predict-cyberattacks-3cde9c71e844?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:39Z **Tutorial on x86 Architecture: From Basics to Cybersecurity Links**
[![](https://cdn-images-1.medium.com/max/1280/1*nWe1RXvx0OFJFAGvTuRBuA.jpeg)](https://infosecwriteups.com/tutorial-on-x86-architecture-from-basics-to-cybersecurity-links-c01d956d4d85?source=rss----7b722bfd1b8d---4)

Discover the intricacies of X86 architecture and its pivotal role in cybersecurity. This guide offers a deep dive into the components and…

[Continue readin ... ⌘ [Read more](https://infosecwriteups.com/tutorial-on-x86-architecture-from-basics-to-cybersecurity-links-c01d956d4d85?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:35Z **NTFS Filesystem: Alternate Data Stream (ADS)** ⌘ [Read more](https://infosecwriteups.com/ntfs-filesystem-alternate-data-stream-ads-c0e4a2402563?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:31Z **Creating Payloads with ScareCrow to Mimic Reputable Sources and Bypass Anti-Virus** ⌘ [Read more](https://infosecwriteups.com/creating-payloads-with-scarecrow-to-mimic-reputable-sources-and-bypass-anti-virus-01196cac741e?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:30Z **Breaking Safeguards: Unveil “Many-Shot Jailbreaking” a Method to Bypass All LLM Safety Measures**
[![](https://cdn-images-1.medium.com/max/880/1*ZBrwnep7Tiz6XQ9LbsUMSg.png)](https://infosecwriteups.com/breaking-safeguards-unveil-many-shot-jailbreaking-a-method-to-bypass-all-llm-safety-measures-2d188ebc12fb?source=rss----7b722bfd1b8d---4)

Dive into the world of cybersecurity and AI as we unravel the complex ... ⌘ [Read more](https://infosecwriteups.com/breaking-safeguards-unveil-many-shot-jailbreaking-a-method-to-bypass-all-llm-safety-measures-2d188ebc12fb?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:14Z **XSS Unpacked: What It Is, How It Works, and How to Stop It** ⌘ [Read more](https://infosecwriteups.com/xss-unpacked-what-it-is-how-it-works-and-how-to-stop-it-a27f13abe6ed?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:13Z **How I Hack Web Applications (Part 1)** ⌘ [Read more](https://infosecwriteups.com/how-i-hack-web-applications-part-1-0833c002cc9a?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:11Z **Storm Breaker: Unveiling the Power of the Social Engineering Tool**
[![](https://cdn-images-1.medium.com/max/1920/1*lvIBk7U6j7n1j0AEPFcwnw.png)](https://infosecwriteups.com/storm-breaker-unveiling-the-power-of-the-social-engineering-tool-7e92eabe67b4?source=rss----7b722bfd1b8d---4)

Learn about Storm Breaker, a social engineering tool with extensive capabilities like accessing webcams, microphones, and more. Includes a…

[Continue rea ... ⌘ [Read more](https://infosecwriteups.com/storm-breaker-unveiling-the-power-of-the-social-engineering-tool-7e92eabe67b4?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:10Z **CVE-2024–3400: A Critical Vulnerability in PAN-OS Firewalls**
[![](https://cdn-images-1.medium.com/max/700/1*4jhFWkJMiTj9qiGmCTAuFw.jpeg)](https://infosecwriteups.com/cve-2024-3400-a-critical-vulnerability-in-pan-os-firewalls-a7f8c66a10d2?source=rss----7b722bfd1b8d---4)

Command Injection Menace: Unraveling PAN-OS’s Critical Flaw

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/cve-2024-3400-a-critical-vulnerability-in ... ⌘ [Read more](https://infosecwriteups.com/cve-2024-3400-a-critical-vulnerability-in-pan-os-firewalls-a7f8c66a10d2?source=rss----7b722bfd1b8d---4) 2024-04-17T17:42:07Z **If You Want To Be A CISO Then Read This First …**
[![](https://cdn-images-1.medium.com/max/790/1*zFK74nUBclPx2-Y0Q71H4A.png)](https://infosecwriteups.com/if-you-want-to-be-a-ciso-then-read-this-first-036f07ec8d05?source=rss----7b722bfd1b8d---4)

The CISO title should NOT be your end-goal in Cybersecurity

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/if-you-want-to-be-a-ciso-then-read-this-first-036f07ec8d05?source=rss----7b722bf ... ⌘ [Read more](https://infosecwriteups.com/if-you-want-to-be-a-ciso-then-read-this-first-036f07ec8d05?source=rss----7b722bfd1b8d---4) 2024-04-23T06:49:17Z **Mastering Shodan Search Engine** ⌘ [Read more](https://infosecwriteups.com/mastering-shodan-search-engine-8c80b80dae09?source=rss----7b722bfd1b8d---4) 2024-04-23T06:49:16Z **Email Verification Bypass via Remember Me** ⌘ [Read more](https://infosecwriteups.com/email-verification-bypass-via-remember-me-c6d34e6060e9?source=rss----7b722bfd1b8d---4) 2024-04-23T06:49:13Z **Exploiting Symlinks: A Deep Dive into CVE-2024–28185 and CVE-2024–28189 of Judge0 Sandboxes**
[![](https://cdn-images-1.medium.com/max/2600/1*QVTu1vofFMm4j5ej2wX3bA.png)](https://infosecwriteups.com/exploiting-symlinks-a-deep-dive-into-cve-2024-28185-and-cve-2024-28189-of-judge0-sandboxes-36bd471cfc4d?source=rss----7b722bfd1b8d---4)

Explore the intricate vulnerabilities CVE-2024–28185 and CVE-2024–28189 in J ... ⌘ [Read more](https://infosecwriteups.com/exploiting-symlinks-a-deep-dive-into-cve-2024-28185-and-cve-2024-28189-of-judge0-sandboxes-36bd471cfc4d?source=rss----7b722bfd1b8d---4) 2024-04-23T06:48:42Z **Typo Trouble: Exploring the Telegram Python RCE Vulnerability** ⌘ [Read more](https://infosecwriteups.com/typo-trouble-exploring-the-telegram-python-rce-vulnerability-b7bc8a12c9ba?source=rss----7b722bfd1b8d---4) 2024-04-23T06:48:28Z **Active DNS Recon using AXIOM** ⌘ [Read more](https://infosecwriteups.com/active-dns-recon-using-axiom-a5239b95f5ad?source=rss----7b722bfd1b8d---4) 2024-04-23T06:47:08Z **Information Disclosure: Story of 500€ + 400$ Bounty** ⌘ [Read more](https://infosecwriteups.com/information-disclosure-story-of-500-400-bounty-97d3b343f9ad?source=rss----7b722bfd1b8d---4) 2024-04-23T06:46:58Z **Demystifying Password Cracking: Attacks and Defence Strategies** ⌘ [Read more](https://infosecwriteups.com/demystifying-password-cracking-attacks-and-defence-strategies-1304bda73249?source=rss----7b722bfd1b8d---4) 2024-04-23T06:46:49Z **Race Condition and Broken Access Control on Developer Dashboard** ⌘ [Read more](https://infosecwriteups.com/race-condition-and-broken-access-control-on-developer-dashboard-2a4e62c5f841?source=rss----7b722bfd1b8d---4) 2024-04-23T06:46:42Z **Windows Fundamentals 1 | TryHackMe Walk-Through** ⌘ [Read more](https://infosecwriteups.com/windows-fundamentals-1-tryhackme-walkthrough-20fae4f9bd68?source=rss----7b722bfd1b8d---4) 2024-04-23T06:46:22Z **Automate XSS testing with real browser rendering** ⌘ [Read more](https://infosecwriteups.com/automate-xss-testing-with-real-browser-rendering-e81f55a98025?source=rss----7b722bfd1b8d---4) 2024-04-24T07:52:03Z **Hack Stories: Hacking Hackers EP:3**
[![](https://cdn-images-1.medium.com/max/1600/1*PlyYrXHZtyXakETaEUIgLA.jpeg)](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-3-11b1f0e002e8?source=rss----7b722bfd1b8d---4)

The Cybersecurity World is Not As Big As You May Think

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-3-11b1f0e002e8?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/hack-stories-hacking-hackers-ep-3-11b1f0e002e8?source=rss----7b722bfd1b8d---4) 2024-04-25T07:51:50Z **Understanding 403 Bypass: A Critical Vulnerability in Web Application Security** ⌘ [Read more](https://infosecwriteups.com/understanding-403-bypass-a-critical-vulnerability-in-web-application-security-2b9f0318f3a4?source=rss----7b722bfd1b8d---4) 2024-04-26T07:51:45Z **Private Interact.sh server setup with a web dashboard** ⌘ [Read more](https://infosecwriteups.com/private-interact-sh-server-setup-with-a-web-dashboard-6b0320645536?source=rss----7b722bfd1b8d---4) 2024-04-29T14:09:38Z **Think You’re Talking to Real Customer Service? Think Again: Unveiling the Customer Service Scam** ⌘ [Read more](https://infosecwriteups.com/think-youre-talking-to-real-customer-service-think-again-unveiling-the-customer-service-scam-f212919a79fb?source=rss----7b722bfd1b8d---4) 2024-04-29T14:09:33Z **Improve Your Security Skills with OWASP Juice Shop!** ⌘ [Read more](https://infosecwriteups.com/improve-your-security-skills-with-owasp-juice-shop-78f36797ef1c?source=rss----7b722bfd1b8d---4) 2024-04-29T14:09:25Z **Is That Really Your Bank Calling? Unraveling the Web of Vishing Scams!** ⌘ [Read more](https://infosecwriteups.com/is-that-really-your-bank-calling-unraveling-the-web-of-vishing-scams-d52439b5fd15?source=rss----7b722bfd1b8d---4) 2024-04-29T14:24:47Z **The Diamond Model: Simple Intelligence-Driven Intrusion Analysis**
[![](https://cdn-images-1.medium.com/max/1920/1*Wda2y4ISlb4KwGswt1eLww.jpeg)](https://infosecwriteups.com/the-diamond-model-simple-intelligence-driven-intrusion-analysis-b422e0e5da26?source=rss----7b722bfd1b8d---4)

Elevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start.

[Continue reading on InfoSec Wr ... ⌘ [Read more](https://infosecwriteups.com/the-diamond-model-simple-intelligence-driven-intrusion-analysis-b422e0e5da26?source=rss----7b722bfd1b8d---4) 2024-04-29T14:24:30Z **Analysis of Competing Hypotheses: How to Find Plausible Answers**
[![](https://cdn-images-1.medium.com/max/1920/1*B_4sdvrPdo2IKO_Zhn9mRA.jpeg)](https://infosecwriteups.com/analysis-of-competing-hypotheses-how-to-find-plausible-answers-d5992ac545a1?source=rss----7b722bfd1b8d---4)

This guide will help you discover the power of the Analysis of Competing Hypotheses technique and learn how to analyze intelligence…

[Continue reading on Info ... ⌘ [Read more](https://infosecwriteups.com/analysis-of-competing-hypotheses-how-to-find-plausible-answers-d5992ac545a1?source=rss----7b722bfd1b8d---4) 2024-04-29T14:23:55Z **Devvortex Hackthebox Walkthrough** ⌘ [Read more](https://infosecwriteups.com/devvortex-hackthebox-walkthrough-6b6cbf8df1eb?source=rss----7b722bfd1b8d---4) 2024-04-29T14:23:24Z **Port Scanning for Bug Bounties** ⌘ [Read more](https://infosecwriteups.com/port-scanning-for-bug-bounties-b28b23ce9fbf?source=rss----7b722bfd1b8d---4) 2024-04-29T14:22:49Z **TryHackMe - Mr. Robot CTF** ⌘ [Read more](https://infosecwriteups.com/tryhackme-mr-robot-ctf-eca346eaa793?source=rss----7b722bfd1b8d---4) 2024-04-29T14:22:12Z **Threat Modeling: A Staple of Great Cyber Threat Intelligence**
[![](https://cdn-images-1.medium.com/max/1200/1*-bIcc0CmrWXGMbzzJddGzg.jpeg)](https://infosecwriteups.com/threat-modeling-a-staple-of-great-cyber-threat-intelligence-ebd5d42fc397?source=rss----7b722bfd1b8d---4)

Learn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this guide.

[Continue reading on InfoSec ... ⌘ [Read more](https://infosecwriteups.com/threat-modeling-a-staple-of-great-cyber-threat-intelligence-ebd5d42fc397?source=rss----7b722bfd1b8d---4) 2024-04-29T14:21:51Z **How to Optimize Data Sources: Collection Management Framework**
[![](https://cdn-images-1.medium.com/max/1200/1*vG0IW_12Rrz-cWEvcfGx9Q.jpeg)](https://infosecwriteups.com/how-to-optimize-data-sources-collection-management-framework-190a9e5dd781?source=rss----7b722bfd1b8d---4)

Discover the best way of collecting intelligence in this complete guide to collection management frameworks.

[Continue reading on InfoSec Write-ups »](https://infos ... ⌘ [Read more](https://infosecwriteups.com/how-to-optimize-data-sources-collection-management-framework-190a9e5dd781?source=rss----7b722bfd1b8d---4) 2024-04-29T14:20:48Z **Should You Invest In Cybersecurity Degrees or Certifications For Your Career ??**
[![](https://cdn-images-1.medium.com/max/2600/1*agYSaJA_KrE8lDjSfqtIYg.png)](https://infosecwriteups.com/should-you-invest-in-cybersecurity-degrees-or-certifications-for-your-career-d8347ef47177?source=rss----7b722bfd1b8d---4)

My advice to help you in this career decision.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.co ... ⌘ [Read more](https://infosecwriteups.com/should-you-invest-in-cybersecurity-degrees-or-certifications-for-your-career-d8347ef47177?source=rss----7b722bfd1b8d---4) 2024-04-29T14:20:33Z **Reading Between the Lines of Code: Ziraat_Stealer** ⌘ [Read more](https://infosecwriteups.com/reading-between-the-lines-of-code-ziraat-stealer-68f4971d0e85?source=rss----7b722bfd1b8d---4) 2024-04-29T14:19:00Z **Securing Your Data in the Cloud** ⌘ [Read more](https://infosecwriteups.com/securing-your-data-in-the-cloud-479131efd5fc?source=rss----7b722bfd1b8d---4) 2024-04-30T03:22:08Z **No Dev Team? No Problem: Writing Malware and Anti-Malware With GenAI** ⌘ [Read more](https://infosecwriteups.com/no-dev-team-no-problem-writing-malware-and-anti-malware-with-genai-cbce13160e13?source=rss----7b722bfd1b8d---4) 2024-04-30T15:11:01Z **Honeypots 101: A Beginner’s Guide to Honeypots** ⌘ [Read more](https://infosecwriteups.com/honeypots-101-a-beginners-guide-to-honeypots-51469d90d125?source=rss----7b722bfd1b8d---4) 2024-05-01T15:21:41Z **AWS S3 Bucket Misconfiguration Exposes PII and Documents of Job Seekers** ⌘ [Read more](https://infosecwriteups.com/aws-s3-bucket-misconfiguration-exposes-pii-and-documents-of-job-seekers-7b1332b0ecf1?source=rss----7b722bfd1b8d---4) 2024-05-10T04:56:53Z **WolvCTF 2024: Forensics Challenges** ⌘ [Read more](https://infosecwriteups.com/wolvctf-2024-forensics-challenges-3f307fab6576?source=rss----7b722bfd1b8d---4) 2024-05-10T04:56:29Z **Defense against Ransomware**
[![](https://cdn-images-1.medium.com/max/2600/1*8aFhMQ7XsV2zwyKliOPshg.jpeg)](https://infosecwriteups.com/defense-against-ransomware-8bf30532e93d?source=rss----7b722bfd1b8d---4)

Cyber-attacks, malware, and aspects of ransomware.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/defense-against-ransomware-8bf30532e93d?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/defense-against-ransomware-8bf30532e93d?source=rss----7b722bfd1b8d---4) 2024-05-10T04:56:10Z **Hacking Web Meeting/Webinar App** ⌘ [Read more](https://infosecwriteups.com/hacking-web-meeting-webinar-app-1cb31c648752?source=rss----7b722bfd1b8d---4) 2024-05-10T04:55:45Z **Privilege Escalation Using SCIM Provisioning** ⌘ [Read more](https://infosecwriteups.com/privilege-escalation-using-scim-provisioning-ca61ed9606bd?source=rss----7b722bfd1b8d---4) 2024-05-10T04:55:42Z **Admin Account Takeover** ⌘ [Read more](https://infosecwriteups.com/admin-account-takeover-ab7535fe0fdb?source=rss----7b722bfd1b8d---4) 2024-05-10T04:55:37Z **Sensitive data leak using IDOR in integration service** ⌘ [Read more](https://infosecwriteups.com/sensitive-data-leak-using-idor-in-integration-service-d9301be9c91e?source=rss----7b722bfd1b8d---4) 2024-05-10T04:55:20Z **Understanding Zero Trust Architecture: A New Paradigm in Cybersecurity** ⌘ [Read more](https://infosecwriteups.com/understanding-zero-trust-architecture-a-new-paradigm-in-cybersecurity-b0f144f75f6c?source=rss----7b722bfd1b8d---4) 2024-05-10T04:54:06Z **HackTheBox Academy: Privilege Escalation** ⌘ [Read more](https://infosecwriteups.com/hackthebox-academy-privilege-escalation-ca0a8ad2259e?source=rss----7b722bfd1b8d---4) 2024-05-10T04:52:48Z **Incident Response: A Comprehensive Guide for Businesses and Cybersecurity Professionals** ⌘ [Read more](https://infosecwriteups.com/incident-response-a-comprehensive-guide-for-businesses-and-cybersecurity-professionals-f4debbcb5ecc?source=rss----7b722bfd1b8d---4) 2024-05-10T04:52:35Z **Unlocking ChatGPT’s Internal Prompts: A Guide to Reverse Engineering AI Conversation Models**
[![](https://cdn-images-1.medium.com/max/1024/1*GKOpxAclFYhviLmsWnzqBQ.png)](https://infosecwriteups.com/unlocking-chatgpts-internal-prompts-a-guide-to-reverse-engineering-ai-conversation-models-eebdd9bdfd2b?source=rss----7b722bfd1b8d---4)

Discover how to reverse engineer ChatGPT’s internal prompts, unraveling the st ... ⌘ [Read more](https://infosecwriteups.com/unlocking-chatgpts-internal-prompts-a-guide-to-reverse-engineering-ai-conversation-models-eebdd9bdfd2b?source=rss----7b722bfd1b8d---4) 2024-05-11T05:52:17Z **A Guide To Securing Your Remote Access Using SSH Keys** ⌘ [Read more](https://infosecwriteups.com/a-guide-to-securing-your-remote-access-using-ssh-keys-84b48097f3bf?source=rss----7b722bfd1b8d---4) 2024-05-11T17:57:33Z **My Hunt: Discovering Microsoft Bugs**
[![](https://cdn-images-1.medium.com/max/2600/0*-v-YoNZIs9Lf1xv1)](https://infosecwriteups.com/my-hunt-discovering-microsoft-bugs-f6a9c790bec0?source=rss----7b722bfd1b8d---4)

Navigating the Terrain of Microsoft’s Software: Insights from a Bug Hunter

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/my-hunt-discovering-microsoft-bugs-f6a9c790bec0?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/my-hunt-discovering-microsoft-bugs-f6a9c790bec0?source=rss----7b722bfd1b8d---4) 2024-05-12T05:51:42Z **Hook, Line, and Sinker: Navigating the Waters of Phishing Attacks in 2024** ⌘ [Read more](https://infosecwriteups.com/hook-line-and-sinker-navigating-the-waters-of-phishing-attacks-in-2024-a809f127525a?source=rss----7b722bfd1b8d---4) 2024-05-12T18:54:13Z **5 Ways I Can Find Your Deleted Files as An Ethical Hacker!** ⌘ [Read more](https://infosecwriteups.com/5-ways-i-can-find-your-deleted-files-as-an-ethical-hacker-4bc6508392fa?source=rss----7b722bfd1b8d---4) 2024-05-12T18:53:34Z **For Business Reasons | TryHackMe Write-Up** ⌘ [Read more](https://infosecwriteups.com/for-business-reasons-tryhackme-write-up-215818dad959?source=rss----7b722bfd1b8d---4) 2024-05-12T18:53:25Z **BSQL Injection Shenanigans** ⌘ [Read more](https://infosecwriteups.com/bsql-injection-shenanigans-d6bd545d475a?source=rss----7b722bfd1b8d---4) 2024-05-12T18:53:13Z **Bypassing UAC** ⌘ [Read more](https://infosecwriteups.com/bypassing-uac-1ba99a173b30?source=rss----7b722bfd1b8d---4) 2024-05-12T18:52:33Z **My LLM Bug Bounty Journey on Hugging Face Hub via Protect AI**
[![](https://cdn-images-1.medium.com/max/1024/1*GYi4vEbJ_bqf-e5zt0xZMw.png)](https://infosecwriteups.com/my-llm-bug-bounty-journey-on-hugging-face-hub-via-protect-ai-9f3a1bc72c2e?source=rss----7b722bfd1b8d---4)

From Informative Rejection to Black Hat Briefing

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/my-llm-bug-bounty-journey-on-hugging-face-hub-v ... ⌘ [Read more](https://infosecwriteups.com/my-llm-bug-bounty-journey-on-hugging-face-hub-via-protect-ai-9f3a1bc72c2e?source=rss----7b722bfd1b8d---4) 2024-05-12T18:52:23Z **Hacking into 30+ tesla cars around the world using a third party software** ⌘ [Read more](https://infosecwriteups.com/hacking-into-30-tesla-cars-around-the-world-using-a-third-party-software-00957ac68c92?source=rss----7b722bfd1b8d---4) 2024-05-12T18:51:57Z **Creative | TryHackMe Write-Up** ⌘ [Read more](https://infosecwriteups.com/creative-tryhackme-write-up-120b26abb719?source=rss----7b722bfd1b8d---4) 2024-05-13T05:57:30Z **HacktheBox Starting Point: Explosion Walkthrough** ⌘ [Read more](https://infosecwriteups.com/hackthebox-starting-point-explosion-walkthrough-55c0c78940d7?source=rss----7b722bfd1b8d---4) 2024-05-13T19:57:28Z **Hundreds of companies’ internal data exposed — Part 2: The FreshService misconfiguration** ⌘ [Read more](https://infosecwriteups.com/hundreds-of-companies-internal-data-exposed-part-2-the-freshservice-misconfiguration-a9432c0b5dc8?source=rss----7b722bfd1b8d---4) 2024-05-14T19:56:16Z **JNDI Injection — The Complete Story** ⌘ [Read more](https://infosecwriteups.com/jndi-injection-the-complete-story-4c5bfbb3f6e1?source=rss----7b722bfd1b8d---4) 2024-05-23T14:23:30Z **Microsoft Activation Scripts (MAS): Guide to Freely Activating Windows and Office**
[![](https://cdn-images-1.medium.com/max/1098/1*gwznYP-qI7oPItaZO3J3Ig.jpeg)](https://infosecwriteups.com/microsoft-activation-scripts-mas-guide-to-freely-activating-windows-and-office-21d1d8349d36?source=rss----7b722bfd1b8d---4)

Discover how to activate Windows and Office using Microsoft Activation Scripts (MAS) with methods like HWID, ... ⌘ [Read more](https://infosecwriteups.com/microsoft-activation-scripts-mas-guide-to-freely-activating-windows-and-office-21d1d8349d36?source=rss----7b722bfd1b8d---4) 2024-05-23T14:22:05Z **Scheduled Network Activity Reports using a Simple set of Tools** ⌘ [Read more](https://infosecwriteups.com/scheduled-network-activity-reports-using-a-simple-set-of-tools-646367b22c33?source=rss----7b722bfd1b8d---4) 2024-05-23T14:21:35Z **Bypass Firewall by Finding Origin IP** ⌘ [Read more](https://infosecwriteups.com/bypass-firewall-by-finding-origin-ip-41ba984e1342?source=rss----7b722bfd1b8d---4) 2024-05-23T14:21:19Z **Root user account takeover via SQL Injection** ⌘ [Read more](https://infosecwriteups.com/root-user-account-takeover-via-sql-injection-5c21a6091d4c?source=rss----7b722bfd1b8d---4) 2024-05-23T14:21:05Z **Honeypots 102: Setting up a SANS Internet Storm Center’s DShield Honeypot** ⌘ [Read more](https://infosecwriteups.com/honeypots-102-setting-up-a-sans-internet-storm-centers-dshield-honeypot-1ec1774bd949?source=rss----7b722bfd1b8d---4) 2024-05-24T15:46:32Z **Shhh…Don’t Tell the Database Admin: SQLi Lab Exploits** ⌘ [Read more](https://infosecwriteups.com/shhh-dont-tell-the-database-admin-sqli-lab-exploits-5472db4c76ce?source=rss----7b722bfd1b8d---4) 2024-05-24T15:45:11Z **Google Dorking | THM**
[![](https://cdn-images-1.medium.com/max/2600/0*eHNmF1IY5ni3plSu)](https://infosecwriteups.com/google-dorking-thm-a87dc849c4b8?source=rss----7b722bfd1b8d---4)

How Search Engines Operate and Utilize Hidden Content

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/google-dorking-thm-a87dc849c4b8?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/google-dorking-thm-a87dc849c4b8?source=rss----7b722bfd1b8d---4) 2024-05-24T15:45:09Z **How I Got My First Bounty: The Exciting Story of My Bug Bounty Breakthrough** ⌘ [Read more](https://infosecwriteups.com/how-i-got-my-first-bounty-the-exciting-story-of-my-bug-bounty-breakthrough-d8391973ed41?source=rss----7b722bfd1b8d---4) 2024-05-24T15:45:08Z **CVE-2024–4761: Exploiting Chrome’s JavaScript Engine Highly Exploited (PoC presented)**
[![](https://cdn-images-1.medium.com/max/959/1*X9mvGPEzOwo_kOqtzLuW1w.png)](https://infosecwriteups.com/cve-2024-4761-exploiting-chromes-javascript-engine-highly-exploited-poc-presented-dcf9cab95c00?source=rss----7b722bfd1b8d---4)

Discover the technical breakdown of CVE-2024–4761, an out-of-bounds write vulnerability in Chrome’s V ... ⌘ [Read more](https://infosecwriteups.com/cve-2024-4761-exploiting-chromes-javascript-engine-highly-exploited-poc-presented-dcf9cab95c00?source=rss----7b722bfd1b8d---4) 2024-05-24T15:44:54Z **TryHackMe - Network Services** ⌘ [Read more](https://infosecwriteups.com/tryhackme-network-services-08874b587a38?source=rss----7b722bfd1b8d---4) 2024-05-24T15:44:13Z **Enriching Microsoft Sentinel Incidents with AlienVault OTX Threat Intelligence Playbook** ⌘ [Read more](https://infosecwriteups.com/enriching-microsoft-sentinel-incidents-with-alienvault-otx-threat-intelligence-playbook-570d91325ebf?source=rss----7b722bfd1b8d---4) 2024-05-24T15:44:09Z **BSQL Injection Shenanigans 2** ⌘ [Read more](https://infosecwriteups.com/bsql-injection-shenanigans-2-75e96df54e2a?source=rss----7b722bfd1b8d---4) 2024-05-24T15:43:47Z **Google Cybersecurity Certification: Your Gateway to a New Career ?**
[![](https://cdn-images-1.medium.com/max/600/1*uyzuwMbTn65HIEW-CZZDJw.png)](https://infosecwriteups.com/google-cybersecurity-certification-your-gateway-to-a-new-career-236a8a47c60e?source=rss----7b722bfd1b8d---4)

Discover how the Google Cybersecurity Certification on Coursera can help you pivot to a cybersecurity career. Learn from my personal…

[Continue reading on ... ⌘ [Read more](https://infosecwriteups.com/google-cybersecurity-certification-your-gateway-to-a-new-career-236a8a47c60e?source=rss----7b722bfd1b8d---4) 2024-05-24T15:43:40Z **CyberLens — TryHackMe Writeup** ⌘ [Read more](https://infosecwriteups.com/cyberlens-tryhackme-writeup-d3320449ce41?source=rss----7b722bfd1b8d---4) 2024-05-24T15:43:16Z **Session fixation | Cookie injection leading to ATO Write-Up** ⌘ [Read more](https://infosecwriteups.com/session-fixation-cookie-injection-leading-to-ato-write-up-98e29d2851b9?source=rss----7b722bfd1b8d---4) 2024-05-24T15:51:16Z **TCM Academy Walkthrough : A Hands-On Experience** ⌘ [Read more](https://infosecwriteups.com/tcm-academy-walkthrough-a-hands-on-experience-e891243c61a8?source=rss----7b722bfd1b8d---4) 2024-05-24T15:51:11Z **THM:A Comprehensive Guide to the Pickle Rick TryHackMe Challenge** ⌘ [Read more](https://infosecwriteups.com/thm-a-comprehensive-guide-to-the-pickle-rick-tryhackme-challenge-9a157238e628?source=rss----7b722bfd1b8d---4) 2024-05-24T15:50:52Z **Fingerprinting Databases: Error based SQLi (Oracle, MySQL, MS)** ⌘ [Read more](https://infosecwriteups.com/fingerprinting-databases-error-based-sqli-oracle-mysql-ms-08926f83124f?source=rss----7b722bfd1b8d---4) 2024-05-24T15:50:46Z **CVE-2023–52424: The WiFi SSID Confusion Attack Explained**
[![](https://cdn-images-1.medium.com/max/664/1*xtZCTtX0bhTd33jVvKYvPg.png)](https://infosecwriteups.com/cve-2023-52424-the-wifi-ssid-confusion-attack-explained-26e43f5cff40?source=rss----7b722bfd1b8d---4)

CVE-2023–52424, also known as the SSID Confusion Attack, has brought new challenges to wireless network security.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c ... ⌘ [Read more](https://infosecwriteups.com/cve-2023-52424-the-wifi-ssid-confusion-attack-explained-26e43f5cff40?source=rss----7b722bfd1b8d---4) 2024-05-24T15:50:41Z **The Ultimate Cyber Security Weapon: SharePoint Lists** ⌘ [Read more](https://infosecwriteups.com/the-ultimate-cyber-security-weapon-sharepoint-lists-6232b74903fb?source=rss----7b722bfd1b8d---4) 2024-05-25T16:52:18Z **THM — Athena**
[![](https://cdn-images-1.medium.com/max/2600/0*3vUEi6Rq6XYJwojw)](https://infosecwriteups.com/thm-athena-afafaf479750?source=rss----7b722bfd1b8d---4)

Are you capable of mastering the entire system and exploiting all vulnerabilities?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/thm-athena-afafaf479750?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/thm-athena-afafaf479750?source=rss----7b722bfd1b8d---4) 2024-05-29T03:43:28Z **Subdomain takeover via AWS s3 bucket** ⌘ [Read more](https://infosecwriteups.com/subdomain-takeover-via-aws-s3-bucket-9c54b1b71c46?source=rss----7b722bfd1b8d---4) 2024-05-29T03:43:08Z **Understanding the CrowdStrike 2024 Global Threat Report** ⌘ [Read more](https://infosecwriteups.com/understanding-the-crowdstrike-2024-global-threat-report-7dd77a40e0ab?source=rss----7b722bfd1b8d---4) 2024-05-29T03:43:00Z **Prevent Cross-Site Scripting Attacks in Node.js**
[![](https://cdn-images-1.medium.com/max/1200/1*YTdRYUeK3c7vq-4JDL_BsQ.jpeg)](https://infosecwriteups.com/prevent-cross-site-scripting-attacks-in-node-js-6b6fa5dd689f?source=rss----7b722bfd1b8d---4)

A step-by-step guide on how to protect your website from XSS attacks.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/prevent-cross-site-scripting-attacks-in-node-js-6b6fa5dd689f?sou ... ⌘ [Read more](https://infosecwriteups.com/prevent-cross-site-scripting-attacks-in-node-js-6b6fa5dd689f?source=rss----7b722bfd1b8d---4) 2024-05-29T03:42:58Z **HTB: Bizness walkthrough** ⌘ [Read more](https://infosecwriteups.com/htb-bizness-walkthrough-8511c455fa30?source=rss----7b722bfd1b8d---4) 2024-05-29T03:42:56Z **HTB Business CTF 2024 — Submerged (Fullpwn)— Write-up** ⌘ [Read more](https://infosecwriteups.com/htb-business-ctf-2024-submerged-fullpwn-write-up-6fb5be96540d?source=rss----7b722bfd1b8d---4) 2024-05-29T03:42:50Z **CozyHosting HTB Easy | Walkthrough** ⌘ [Read more](https://infosecwriteups.com/cozyhosting-htb-easy-walkthrough-957d8be9f31a?source=rss----7b722bfd1b8d---4) 2024-05-29T03:42:15Z **Blind SQL Injection: Uncovering Administrator Password One Character at a Time-Lab9** ⌘ [Read more](https://infosecwriteups.com/blind-sql-injection-uncovering-administrator-password-one-character-at-a-time-lab9-b6cbfd8d1cef?source=rss----7b722bfd1b8d---4) 2024-05-29T03:42:04Z **Unlocking Superpowers: How to Gain Root Access in Ubuntu and Defeat ‘User not sudoers’ Error** ⌘ [Read more](https://infosecwriteups.com/unlocking-superpowers-how-to-gain-root-access-in-ubuntu-and-defeat-user-not-sudoers-error-5f04dee4e612?source=rss----7b722bfd1b8d---4) 2024-05-29T03:41:35Z **All About API Security Pentesting** ⌘ [Read more](https://infosecwriteups.com/all-about-api-security-pentesting-60dba50e2766?source=rss----7b722bfd1b8d---4) 2024-05-29T03:40:32Z **Intrusion Analysis: How to Fully Investigate Cyber Security Attacks**
[![](https://cdn-images-1.medium.com/max/1920/1*m0hYLf9FJ4zQHTkXR1bCcw.jpeg)](https://infosecwriteups.com/intrusion-analysis-how-to-fully-investigate-cyber-security-attacks-9c4a8c3b8de1?source=rss----7b722bfd1b8d---4)

Learn how to perform intrusion analysis in this comprehensive guide, including a four-step process, tips and tricks, and practical…

[Continue read ... ⌘ [Read more](https://infosecwriteups.com/intrusion-analysis-how-to-fully-investigate-cyber-security-attacks-9c4a8c3b8de1?source=rss----7b722bfd1b8d---4) 2024-06-05T05:14:15Z **BYOVD Attacks: The Hidden Threats of Vulnerable Drivers**
[![](https://cdn-images-1.medium.com/max/900/1*0jcAJswaEEEfEYIza9XEIw.png)](https://infosecwriteups.com/byovd-attacks-the-hidden-threats-of-vulnerable-drivers-d1aebe9b552e?source=rss----7b722bfd1b8d---4)

Discover the insidious world of BYOVD (Bring Your Own Vulnerable Driver) attacks, where cybercriminals exploit legitimate drivers to…

[Continue reading on InfoSec Write-ups »](https:// ... ⌘ [Read more](https://infosecwriteups.com/byovd-attacks-the-hidden-threats-of-vulnerable-drivers-d1aebe9b552e?source=rss----7b722bfd1b8d---4) 2024-06-05T05:14:11Z **Mitigating Malware**
[![](https://cdn-images-1.medium.com/max/933/1*MOFKzT8xldwlR4K4S7A-Cw.png)](https://infosecwriteups.com/mitigating-malware-923d6dfad0a8?source=rss----7b722bfd1b8d---4)

This is how you mitigate common network attacks

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/mitigating-malware-923d6dfad0a8?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/mitigating-malware-923d6dfad0a8?source=rss----7b722bfd1b8d---4) 2024-06-05T05:13:15Z **Building Own Nuclei Templates** ⌘ [Read more](https://infosecwriteups.com/building-own-nuclei-templates-c0e45ea7aac7?source=rss----7b722bfd1b8d---4) 2024-06-05T05:13:13Z **Static Testing of iOS Applications** ⌘ [Read more](https://infosecwriteups.com/static-testing-of-ios-applications-cb09bd8f2927?source=rss----7b722bfd1b8d---4) 2024-06-05T05:12:53Z **SSL Chain of Trust | How SSL Chain Works | Self-Signed Certificate, Root Cert, Intermediate…** ⌘ [Read more](https://infosecwriteups.com/ssl-chain-of-trust-how-ssl-chain-works-self-signed-certificate-root-cert-intermediate-6c77a8b715fa?source=rss----7b722bfd1b8d---4) 2024-06-05T05:12:38Z **TryHackMe - Network Services 2** ⌘ [Read more](https://infosecwriteups.com/tryhackme-network-services-2-28f4baaa2a09?source=rss----7b722bfd1b8d---4) 2024-06-05T05:12:26Z **Next Generation Nuclei: Detecting SQLi with Logic** ⌘ [Read more](https://infosecwriteups.com/next-generation-nuclei-detecting-sqli-with-logic-05549c34885b?source=rss----7b722bfd1b8d---4) 2024-06-05T05:12:11Z **Install Nuclei | Tool** ⌘ [Read more](https://infosecwriteups.com/install-nuclei-tool-b1adfc5e657c?source=rss----7b722bfd1b8d---4) 2024-06-05T05:12:07Z **Install Subfinder |Tool** ⌘ [Read more](https://infosecwriteups.com/install-subfinder-tool-cd7f4eaadff4?source=rss----7b722bfd1b8d---4) 2024-06-05T05:09:54Z **Web Application Penetration Checklist** ⌘ [Read more](https://infosecwriteups.com/web-application-penetration-checklist-fdb34c466975?source=rss----7b722bfd1b8d---4) 2024-06-15T11:51:02Z **Airplane: THM WALKTHROUGH** ⌘ [Read more](https://infosecwriteups.com/airplane-thm-walkthrough-8f8e25e13fe9?source=rss----7b722bfd1b8d---4) 2024-06-15T11:51:00Z **Honeypots 103: Decoding Your SANS DShield Honeypot’s Data** ⌘ [Read more](https://infosecwriteups.com/honeypots-103-decoding-your-sans-dshield-honeypots-data-194dfb7b5a5f?source=rss----7b722bfd1b8d---4) 2024-06-15T11:50:57Z **Ransomware Evolution and Defense Strategies** ⌘ [Read more](https://infosecwriteups.com/ransomware-evolution-and-defense-strategies-481c79fc5a13?source=rss----7b722bfd1b8d---4) 2024-06-15T11:50:46Z **HOW I HACKED NASA?** ⌘ [Read more](https://infosecwriteups.com/how-i-hacked-nasa-0715b6b5d7b8?source=rss----7b722bfd1b8d---4) 2024-06-15T11:50:25Z **Exploiting a Visible Error-based SQL Injection to get Admin Password: Lab11** ⌘ [Read more](https://infosecwriteups.com/exploiting-a-visible-error-based-sql-injection-to-get-admin-password-lab11-7fe03131c366?source=rss----7b722bfd1b8d---4) 2024-06-15T11:50:08Z **Lab10 : Uncovering Admin Password Through Conditional Error Handling in SQL Injection** ⌘ [Read more](https://infosecwriteups.com/lab10-uncovering-admin-password-through-conditional-error-handling-in-sql-injection-3323874710b1?source=rss----7b722bfd1b8d---4) 2024-06-15T11:49:50Z **I Asked Three CISOs How To Succeed In Cybersecurity. This Is What I Learnt …**
[![](https://cdn-images-1.medium.com/max/2600/0*TCffx04jlqxwVLmh)](https://infosecwriteups.com/i-asked-three-cisos-how-to-succeed-in-cybersecurity-this-is-what-i-learnt-b1fbc2b11a75?source=rss----7b722bfd1b8d---4)

Their Advice Changed My Career Trajectory

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/i-asked-three-cisos-ho ... ⌘ [Read more](https://infosecwriteups.com/i-asked-three-cisos-how-to-succeed-in-cybersecurity-this-is-what-i-learnt-b1fbc2b11a75?source=rss----7b722bfd1b8d---4) 2024-06-15T11:49:15Z **Case Study: Foodmandu Breach by 1337mickey** ⌘ [Read more](https://infosecwriteups.com/case-study-foodmandu-breach-a3970282cb70?source=rss----7b722bfd1b8d---4) 2024-06-15T11:49:11Z **Case Study: Vianet Data Breach** ⌘ [Read more](https://infosecwriteups.com/case-study-vianet-data-breach-cb5dd9d8959c?source=rss----7b722bfd1b8d---4) 2024-06-15T11:49:02Z **Malware, viruses, worms, and Trojan horses**
[![](https://cdn-images-1.medium.com/max/1280/1*CezsEfOXNClXO_0pByzcxA.png)](https://infosecwriteups.com/malware-viruses-worms-and-trojan-horses-10695b7d15ac?source=rss----7b722bfd1b8d---4)

Photo created by the author using an ideogram

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/malware-viruses-worms-and-trojan-horses-10695b7d15ac?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/malware-viruses-worms-and-trojan-horses-10695b7d15ac?source=rss----7b722bfd1b8d---4) 2024-06-17T18:08:39Z **OpManager: CSRF & XS-Leak Chained for Information Disclosure** ⌘ [Read more](https://infosecwriteups.com/opmanager-csrf-xs-leak-chained-for-information-disclosure-382c6ee518ca?source=rss----7b722bfd1b8d---4) 2024-06-17T18:07:52Z **5 Methods I Use To Discover APIs** ⌘ [Read more](https://infosecwriteups.com/5-methods-i-use-to-discover-apis-6d646baa3ffb?source=rss----7b722bfd1b8d---4) 2024-06-17T18:07:47Z **Analyzing a Phishing Email Header** ⌘ [Read more](https://infosecwriteups.com/analyzing-a-phishing-email-header-f940e06fdc82?source=rss----7b722bfd1b8d---4) 2024-06-17T18:07:40Z **Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning** ⌘ [Read more](https://infosecwriteups.com/nuclei-the-ultimate-guide-to-fast-and-customizable-vulnerability-scanning-c86c50168798?source=rss----7b722bfd1b8d---4) 2024-06-17T18:07:35Z **Establishing Remote SSH Connections from Windows to Kali Linux**
[![](https://cdn-images-1.medium.com/max/600/1*0KV6IEMXBag5T4Wd1o7nuw.png)](https://infosecwriteups.com/establishing-remote-ssh-connections-from-windows-to-kali-linux-545c71793fae?source=rss----7b722bfd1b8d---4)

Setting up SSH keys to a Remote Kali Linux VM

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/establishing-remote-ssh-connections-from-wind ... ⌘ [Read more](https://infosecwriteups.com/establishing-remote-ssh-connections-from-windows-to-kali-linux-545c71793fae?source=rss----7b722bfd1b8d---4) 2024-06-17T18:02:01Z **Real World GitLab Account Take Over** ⌘ [Read more](https://infosecwriteups.com/real-world-gitlab-account-take-over-b2e9896a1835?source=rss----7b722bfd1b8d---4) 2024-06-17T18:01:53Z **Busting CSRF: The Hidden Dangers of JSON Exploited** ⌘ [Read more](https://infosecwriteups.com/busting-csrf-the-hidden-dangers-of-json-exploited-fd4aeb4cf47e?source=rss----7b722bfd1b8d---4) 2024-06-17T18:01:27Z **Discovering a $5000 RCE via Dependency Confusion Vulnerability** ⌘ [Read more](https://infosecwriteups.com/discovering-a-5000-rce-via-dependency-confusion-vulnerability-6b0c08ecd5de?source=rss----7b722bfd1b8d---4) 2024-06-17T18:01:22Z **“The Evolution of Phishing Attacks: From Deceptive Emails to Sophisticated Cyber Threats”** ⌘ [Read more](https://infosecwriteups.com/phishing-attacks-12afa03e7301?source=rss----7b722bfd1b8d---4) 2024-06-17T18:00:57Z **“Strengthening Your Cybersecurity Posture: Comprehensive Guide to Conducting Vulnerability…** ⌘ [Read more](https://infosecwriteups.com/strengthening-your-cybersecurity-posture-comprehensive-guide-to-conducting-vulnerability-407fa05117c2?source=rss----7b722bfd1b8d---4) 2024-06-17T19:02:32Z **IDORs: What are they and how to find them**
[![](https://cdn-images-1.medium.com/max/1792/1*k5-IP4OOQlgzbR7xDSdmRg@2x.jpeg)](https://infosecwriteups.com/idors-what-are-they-and-how-to-find-them-f4393fbb522a?source=rss----7b722bfd1b8d---4)

How to find and exploit IDOR vulnerabilities in web applications

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/idors-what-are-they-and-how-to-find-them-f4393fbb522a?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/idors-what-are-they-and-how-to-find-them-f4393fbb522a?source=rss----7b722bfd1b8d---4) 2024-06-25T11:35:17Z **Trust Machine Dockerlabs.es** ⌘ [Read more](https://infosecwriteups.com/trust-machine-dockerlabs-es-147b0a369282?source=rss----7b722bfd1b8d---4) 2024-06-25T11:34:50Z **SQLi WAF Bypass Techniques Part 1 — Time-Based Attacks** ⌘ [Read more](https://infosecwriteups.com/sqli-waf-bypass-techniques-part-1-time-based-attacks-7749689c72ed?source=rss----7b722bfd1b8d---4) 2024-06-25T11:34:40Z **Here Is Another Way To Secure Your Browser** ⌘ [Read more](https://infosecwriteups.com/here-is-another-way-to-secure-your-browser-a4823d035998?source=rss----7b722bfd1b8d---4) 2024-06-25T11:34:35Z **WaniCTF 2024: Forensic Challenges** ⌘ [Read more](https://infosecwriteups.com/wanictf-2024-forensic-challenges-43d5ba370d98?source=rss----7b722bfd1b8d---4) 2024-06-25T11:34:32Z **Install Naabu Kali or Parrot** ⌘ [Read more](https://infosecwriteups.com/install-naabu-kali-or-parrot-ec70622bf03a?source=rss----7b722bfd1b8d---4) 2024-06-25T11:34:25Z **HTB Office Writeup** ⌘ [Read more](https://infosecwriteups.com/htb-office-writeup-c2a8b08d4ead?source=rss----7b722bfd1b8d---4) 2024-06-25T11:33:54Z **Why & How I Use Linode VPS For My Personal and Cybersecurity Projects** ⌘ [Read more](https://infosecwriteups.com/why-how-i-use-linode-vps-for-my-personal-and-cybersecurity-projects-d7f268ad784a?source=rss----7b722bfd1b8d---4) 2024-06-25T11:33:47Z **Exploring Blockchain Technology: Decentralized Ledger Systems Revolutionizing Data Management** ⌘ [Read more](https://infosecwriteups.com/exploring-blockchain-technology-decentralized-ledger-systems-revolutionizing-data-management-76649630ad04?source=rss----7b722bfd1b8d---4) 2024-06-25T11:33:45Z **DLL Injection With Rust** ⌘ [Read more](https://infosecwriteups.com/dll-injection-with-rust-8688757c9ec8?source=rss----7b722bfd1b8d---4) 2024-06-25T11:33:22Z **Safeguarding Health Data: The Critical Role of Cybersecurity in Healthcare** ⌘ [Read more](https://infosecwriteups.com/safeguarding-health-data-the-critical-role-of-cybersecurity-in-healthcare-1e8b85d22040?source=rss----7b722bfd1b8d---4) 2024-07-01T11:29:51Z **Abusing Cloud-Based Sandboxes During Lockdown: An Exploration of Microsoft Services** ⌘ [Read more](https://infosecwriteups.com/abusing-cloud-based-sandboxes-during-lockdown-an-exploration-of-microsoft-services-24e59b2daa39?source=rss----7b722bfd1b8d---4) 2024-07-08T18:03:43Z **A Simple 2FA Bypass** ⌘ [Read more](https://infosecwriteups.com/a-simple-2fa-bypass-43c8af9006ec?source=rss----7b722bfd1b8d---4) 2024-07-08T18:03:25Z **Data Profiling Reveals Why 39+ U.S. States Banned TikTok** ⌘ [Read more](https://infosecwriteups.com/data-profiling-reveals-why-39-u-s-states-banned-tiktok-4c64f968af7b?source=rss----7b722bfd1b8d---4) 2024-07-08T18:03:04Z **BountyDork: Your Ultimate Automatic Dorking Testing Companion For Bug Bounty**
[![](https://cdn-images-1.medium.com/max/1201/1*Yu35KWCBq-NZ3CZ_gLyvwQ.png)](https://infosecwriteups.com/bountydork-your-ultimate-automatic-dorking-testing-companion-for-bug-bounty-b2bd41cb7344?source=rss----7b722bfd1b8d---4)

Discover BountyDork, a powerful tool designed for penetration testers and cybersecurity researchers, offering automation, ... ⌘ [Read more](https://infosecwriteups.com/bountydork-your-ultimate-automatic-dorking-testing-companion-for-bug-bounty-b2bd41cb7344?source=rss----7b722bfd1b8d---4) 2024-07-08T18:02:59Z **RegreSSHion (CVE-2024–6387): Dive into the Latest OpenSSH Server Threat**
[![](https://cdn-images-1.medium.com/max/1284/1*aEOWcd5hWauGJ-roJxNBlg.png)](https://infosecwriteups.com/regresshion-cve-2024-6387-dive-into-the-latest-openssh-server-threat-ba4a6e0983e4?source=rss----7b722bfd1b8d---4)

Explore CVE-2024–6387, a critical cybersecurity vulnerability.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/regres ... ⌘ [Read more](https://infosecwriteups.com/regresshion-cve-2024-6387-dive-into-the-latest-openssh-server-threat-ba4a6e0983e4?source=rss----7b722bfd1b8d---4) 2024-07-08T18:02:56Z **Do You Need To Know Coding In Cloud Security ??**
[![](https://cdn-images-1.medium.com/max/1280/1*Ov2pSiqiDKV6qE6DMEXKrg.png)](https://infosecwriteups.com/do-you-need-to-know-coding-in-cloud-security-3ee686c0c814?source=rss----7b722bfd1b8d---4)

My take on this commonly asked question

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/do-you-need-to-know-coding-in-cloud-security-3ee686c0c814?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/do-you-need-to-know-coding-in-cloud-security-3ee686c0c814?source=rss----7b722bfd1b8d---4) 2024-07-08T18:02:53Z **Step-by-Step Guide on How to Hack Phone Remotely** ⌘ [Read more](https://infosecwriteups.com/step-by-step-guide-on-how-to-hack-phone-remotely-a8b1b8d13015?source=rss----7b722bfd1b8d---4) 2024-07-08T18:02:44Z **Enabling Reproducible and Verification of Time to Network Protocol Testing**
[![](https://cdn-images-1.medium.com/max/632/1*WJsiGG9me2V3P6F3nv2zOg.png)](https://infosecwriteups.com/unveiling-nsct-a-breakthrough-in-network-protocol-testing-b2356c2c7d70?source=rss----7b722bfd1b8d---4)

Discover the “Network Simulator-centric Compositional Testing” (NSCT) methodology, a groundbreaking approach destined to transform network…

[Continue reading o ... ⌘ [Read more](https://infosecwriteups.com/unveiling-nsct-a-breakthrough-in-network-protocol-testing-b2356c2c7d70?source=rss----7b722bfd1b8d---4) 2024-07-08T18:02:40Z **Art of finding zero day vulnerabilities using Open Source AI** ⌘ [Read more](https://infosecwriteups.com/art-of-finding-zero-day-vulnerabilities-using-open-source-ai-e26eaaf323cb?source=rss----7b722bfd1b8d---4) 2024-07-08T18:02:23Z **Unlocking Kubernetes Security: The Complete Checklist** ⌘ [Read more](https://infosecwriteups.com/unlocking-kubernetes-security-the-complete-checklist-538fff3adacf?source=rss----7b722bfd1b8d---4) 2024-07-08T18:01:57Z **0 Click — Account Takeover | Bug Bounty** ⌘ [Read more](https://infosecwriteups.com/0-click-account-takeover-bug-bounty-12d6641f69f5?source=rss----7b722bfd1b8d---4) 2024-07-25T00:36:22Z **Python for Penetration Testing: Automating Cybersecurity with Python** ⌘ [Read more](https://infosecwriteups.com/python-for-penetration-testing-automating-cybersecurity-with-python-f9ea2165852a?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:58Z **Securing HP Printers: How to Safeguard Departmental Printing with Encryption and Access Controls**
Here is a simple version of how you would securely set up HP printers in several company departments:

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/securing-hp-printers-how-to-safeguard-departmental-printing-with-encryption-and-access-controls-1173026578f8?source=rss----7b722bfd1b8d ... ⌘ [Read more](https://infosecwriteups.com/securing-hp-printers-how-to-safeguard-departmental-printing-with-encryption-and-access-controls-1173026578f8?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:52Z **Tuesday Morning Threat Report: Jul 23, 2024** ⌘ [Read more](https://infosecwriteups.com/tuesday-morning-threat-report-jul-23-2024-6d692320232c?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:51Z **Common 403 Bypasses Part 2** ⌘ [Read more](https://infosecwriteups.com/common-403-bypasses-part-2-ae89060debec?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:50Z **Whose Responsibility Is For Good Cyber Hygiene?** ⌘ [Read more](https://infosecwriteups.com/whose-responsibility-is-for-good-cyber-hygiene-cd4e706fd864?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:18Z **CVE-2024–40725 and CVE-2024–40898: Critical Vulnerabilities in Apache HTTP Server**
[![](https://cdn-images-1.medium.com/max/860/1*OrggfSPa0rGGE61ehVPBoA.jpeg)](https://infosecwriteups.com/cve-2024-40725-and-cve-2024-40898-critical-vulnerabilities-in-apache-http-server-d292084255dc?source=rss----7b722bfd1b8d---4)

Explore the details of CVE-2024–40725 and CVE-2024–40898, two critical vulnerabilities in Apache HTTP Serv ... ⌘ [Read more](https://infosecwriteups.com/cve-2024-40725-and-cve-2024-40898-critical-vulnerabilities-in-apache-http-server-d292084255dc?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:16Z **$500 for Cracking Invitation Code For Unauthorized Access & Account Takeover** ⌘ [Read more](https://infosecwriteups.com/500-for-cracking-invitation-code-for-unauthorized-access-account-takeover-558c663fb947?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:15Z **Microsoft’s BIGGEST CRASH…** ⌘ [Read more](https://infosecwriteups.com/microsofts-biggest-crash-21281d6df5ea?source=rss----7b722bfd1b8d---4) 2024-07-30T07:23:13Z **Evolution of Computer Malware Attacks** ⌘ [Read more](https://infosecwriteups.com/evolution-of-computer-malware-attacks-dbdbd140da25?source=rss----7b722bfd1b8d---4) 2024-07-30T07:22:55Z **CrowdStrike BSOD Crisis: System Crashes Everywhere and How to Fix it Manually** ⌘ [Read more](https://infosecwriteups.com/crowdstrike-bsod-crisis-system-crashes-everywhere-and-how-to-fix-it-manually-b47f57dd80e5?source=rss----7b722bfd1b8d---4) 2024-07-30T07:22:48Z **How the Forensics Team Collects Evidence?** ⌘ [Read more](https://infosecwriteups.com/how-the-forensics-team-collects-evidence-21e950f2c4b9?source=rss----7b722bfd1b8d---4) 2024-07-30T08:27:18Z **LFI WITH PHPINFO TO RCE**
[![](https://cdn-images-1.medium.com/max/2600/0*yWo-e6yr90d-NBy9)](https://infosecwriteups.com/lfi-with-phpinfo-to-rce-78318f0dc9ce?source=rss----7b722bfd1b8d---4)

LFI vulnerabilities when testing PHP applications

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/lfi-with-phpinfo-to-rce-78318f0dc9ce?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/lfi-with-phpinfo-to-rce-78318f0dc9ce?source=rss----7b722bfd1b8d---4) 2024-07-30T18:27:29Z **Pentesting Large Language Model Applications and AI Decoy Bypass** ⌘ [Read more](https://infosecwriteups.com/pentesting-large-language-model-applications-and-ai-decoy-bypass-140e1f50db3c?source=rss----7b722bfd1b8d---4) 2024-07-31T08:26:48Z **Introduction to Linux for Blue Teaming** ⌘ [Read more](https://infosecwriteups.com/introduction-to-linux-for-blue-teaming-2ab3273cc884?source=rss----7b722bfd1b8d---4) 2024-07-31T16:27:15Z **Getting Ready for PNPT: My Study Plan and Prep Strategy** ⌘ [Read more](https://infosecwriteups.com/getting-ready-for-pnpt-my-study-plan-and-prep-strategy-fcfc9b60fb77?source=rss----7b722bfd1b8d---4) 2024-08-02T05:26:41Z **Seamless Azure ARC Server Onboarding for Isolated Windows VMs Using Squid Proxy** ⌘ [Read more](https://infosecwriteups.com/seamless-azure-arc-server-onboarding-for-isolated-windows-vms-using-squid-proxy-22a314b18f36?source=rss----7b722bfd1b8d---4) 2024-08-02T05:43:41Z **IoT Cyber Security: Protecting Your Connected World** ⌘ [Read more](https://infosecwriteups.com/iot-cyber-security-protecting-your-connected-world-e2580793b209?source=rss----7b722bfd1b8d---4) 2024-08-02T05:43:35Z **Hacking Porn and Dating sites — a Theme Based Bugbounty Hunting** ⌘ [Read more](https://infosecwriteups.com/hacking-porn-and-dating-sites-a-theme-based-bugbounty-hunting-d024b8137bc7?source=rss----7b722bfd1b8d---4) 2024-08-02T05:43:22Z **Top Google Dorks Explained **
[![](https://cdn-images-1.medium.com/max/900/1*-PY4EPY5ps6qnH1F-w_erw.png)](https://infosecwriteups.com/top-google-dorks-explained-ee6cac1673da?source=rss----7b722bfd1b8d---4)

Top Google Dorks for bug bounty hunting, pentesting, appsec, recon, and SEO.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/top-google-dorks-explained-ee6cac1673da?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/top-google-dorks-explained-ee6cac1673da?source=rss----7b722bfd1b8d---4) 2024-08-02T05:43:11Z **The Power of ‘*’ in Linux: A Cautionary Tale of rm -rf** ⌘ [Read more](https://infosecwriteups.com/the-power-of-in-linux-a-cautionary-tale-of-rm-rf-e2df25f1b9d7?source=rss----7b722bfd1b8d---4) 2024-08-02T05:43:06Z **HTB | Forest** ⌘ [Read more](https://infosecwriteups.com/htb-forest-ce4d06938a23?source=rss----7b722bfd1b8d---4) 2024-08-02T05:42:46Z **HTB | Sauna** ⌘ [Read more](https://infosecwriteups.com/htb-sauna-c6a452b5e0a6?source=rss----7b722bfd1b8d---4) 2024-08-02T05:42:45Z **HTB | Devel** ⌘ [Read more](https://infosecwriteups.com/htb-devel-ab0b7cc4e159?source=rss----7b722bfd1b8d---4) 2024-08-02T05:42:44Z **HTB | Chatterbox** ⌘ [Read more](https://infosecwriteups.com/htb-chatterbox-7deaeec365b5?source=rss----7b722bfd1b8d---4) 2024-08-02T05:42:44Z **’Tis a Hostile Work Environment: Word Maldoc Analysis** ⌘ [Read more](https://infosecwriteups.com/tis-a-hostile-work-environment-word-maldoc-analysis-2d3c642403ed?source=rss----7b722bfd1b8d---4) 2024-08-02T05:42:35Z **Don’t know where to look for bugs ?? In Depth Recon Bug Bounty — Part 02** ⌘ [Read more](https://infosecwriteups.com/dont-know-where-to-look-for-bugs-in-depth-recon-bug-bounty-part-02-9d7c55e045aa?source=rss----7b722bfd1b8d---4) 2024-08-10T07:18:12Z **The Cyber Kill Chain and Incident Response Process** ⌘ [Read more](https://infosecwriteups.com/the-crucial-link-between-the-cyber-kill-chain-and-incident-handling-process-8c3288b8392f?source=rss----7b722bfd1b8d---4) 2024-08-10T07:16:56Z **How I got my first $13500 bounty through Parameter Polluting (HPP)** ⌘ [Read more](https://infosecwriteups.com/how-i-got-my-first-13500-bounty-through-parameter-polluting-hpp-179666b8e8bb?source=rss----7b722bfd1b8d---4) 2024-08-10T07:16:51Z **SSRF: Blacklist and Whitelist-Based Input Filters**
[![](https://cdn-images-1.medium.com/max/1280/1*xTc69es_KaCQ3Cln3dp4Ag.jpeg)](https://infosecwriteups.com/ssrf-blacklist-and-whitelist-based-input-filters-1c602b872731?source=rss----7b722bfd1b8d---4)

Explain and Try To Bypass Blacklist and Whitelist Input Filters

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ssrf-blacklist-and-whitelist-based-input-filters-1c602b872731?sour ... ⌘ [Read more](https://infosecwriteups.com/ssrf-blacklist-and-whitelist-based-input-filters-1c602b872731?source=rss----7b722bfd1b8d---4) 2024-08-10T07:16:05Z **Persistent XSS Vulnerability on Microsoft Bing’s Video Indexing System** ⌘ [Read more](https://infosecwriteups.com/persistent-xss-vulnerability-on-microsoft-bings-video-indexing-system-a46db992ac7b?source=rss----7b722bfd1b8d---4) 2024-08-10T07:15:51Z **Android Penetration Testing + Nuclei (Automated Android Pentesting)** ⌘ [Read more](https://infosecwriteups.com/android-penetration-testing-nuclei-automated-android-pentesting-d03636140f13?source=rss----7b722bfd1b8d---4) 2024-08-10T07:15:47Z **Insecure Webview to Local File Inclusion in Android Pentesting** ⌘ [Read more](https://infosecwriteups.com/insecure-webview-to-local-file-inclusion-in-android-pentesting-f1581e3b730b?source=rss----7b722bfd1b8d---4) 2024-08-12T12:20:51Z **From Fries to Flaws : My Journey into Web App Security (Part V)** ⌘ [Read more](https://infosecwriteups.com/from-fries-to-flaws-my-journey-into-web-app-security-part-v-f0ea86e55845?source=rss----7b722bfd1b8d---4) 2024-08-12T12:20:49Z **$800 Improper Authorization Flaw: Unauthorized Project Reclaiming Post Transfer** ⌘ [Read more](https://infosecwriteups.com/800-improper-authorization-flaw-unauthorized-project-reclaiming-post-transfer-15fe36976604?source=rss----7b722bfd1b8d---4) 2024-08-12T12:20:07Z **From Fries to Flaws : My Journey into Web App Security (Part IV)** ⌘ [Read more](https://infosecwriteups.com/from-fries-to-flaws-my-journey-into-web-app-security-part-iv-956c3fcbec68?source=rss----7b722bfd1b8d---4) 2024-08-12T12:20:05Z **Windows Event IDs That Every Cybersecurity Analyst MUST Know**
[![](https://cdn-images-1.medium.com/max/2600/1*by-mAW-FtBehDb0GH-5_wg.png)](https://infosecwriteups.com/windows-event-ids-that-every-cybersecurity-analyst-must-know-83f863484174?source=rss----7b722bfd1b8d---4)

Uncovering Threats with Critical Windows Event IDs

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/windows-event-ids-that-every-cybersecurity-an ... ⌘ [Read more](https://infosecwriteups.com/windows-event-ids-that-every-cybersecurity-analyst-must-know-83f863484174?source=rss----7b722bfd1b8d---4) 2024-08-12T12:20:03Z **Flutter Windows Thick Client SSL Pinning Bypass** ⌘ [Read more](https://infosecwriteups.com/flutter-windows-thick-client-ssl-pinning-bypass-492389ae1218?source=rss----7b722bfd1b8d---4) 2024-08-12T12:20:00Z **Electron JS ASAR Integrity Bypass** ⌘ [Read more](https://infosecwriteups.com/electron-js-asar-integrity-bypass-431ac4269ed5?source=rss----7b722bfd1b8d---4) 2024-08-12T12:19:44Z **JSON Web Tand Their Vulnerabilities** ⌘ [Read more](https://infosecwriteups.com/json-web-tand-their-vulnerabilities-99aef74a32b6?source=rss----7b722bfd1b8d---4) 2024-08-12T12:19:18Z **Hacking OWASP Juice Shop: Part 5- Privilege Escalation via Manipulated User Registration** ⌘ [Read more](https://infosecwriteups.com/hacking-owasp-juice-shop-part-5-privilege-escalation-via-manipulated-user-registration-4b1c5227aa81?source=rss----7b722bfd1b8d---4) 2024-08-12T12:19:16Z **From Fries to Flaws : My Journey into Web App Security (Part III)** ⌘ [Read more](https://infosecwriteups.com/from-fries-to-flaws-my-journey-into-web-app-security-part-iii-ce91eb384da7?source=rss----7b722bfd1b8d---4) 2024-08-12T12:19:08Z **Unveiling Remote Code Execution in AI chatbot workflows ** ⌘ [Read more](https://infosecwriteups.com/unveiling-remote-code-execution-in-ai-chatbot-workflows-3c7f633f63c3?source=rss----7b722bfd1b8d---4) 2024-08-13T13:21:33Z **Mr. Robot**
[![](https://cdn-images-1.medium.com/max/2600/0*EiGHRMstwBf2mdZt)](https://infosecwriteups.com/mr-robot-387d9cf0afbe?source=rss----7b722bfd1b8d---4)

Based on the Mr. Robot show, can you root this box? Can you root this Mr. Robot styled machine? This is a virtual machine meant for…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/mr-robot-387d9cf0afbe?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/mr-robot-387d9cf0afbe?source=rss----7b722bfd1b8d---4) 2024-08-14T13:21:34Z **From Ice to Intrigue: How MegaMart’s Smart Fridges Unleashed a Cyber Espionage Crisis and What It…**
[![](https://cdn-images-1.medium.com/max/600/1*OL_3QEMjFgSDgHW_cRXlOQ.jpeg)](https://infosecwriteups.com/from-ice-to-intrigue-how-megamarts-smart-fridges-unleashed-a-cyber-espionage-crisis-and-what-it-c014a3db5b11?source=rss----7b722bfd1b8d---4)

In the year 2024, a retail giant, MegaMart Inc., suffered a ... ⌘ [Read more](https://infosecwriteups.com/from-ice-to-intrigue-how-megamarts-smart-fridges-unleashed-a-cyber-espionage-crisis-and-what-it-c014a3db5b11?source=rss----7b722bfd1b8d---4) 2024-08-15T13:09:55Z **Infosec Writeups Is Now In The Boost Nomination Pilot Program** ⌘ [Read more](https://infosecwriteups.com/infosec-writeups-is-now-in-the-boost-nomination-pilot-program-46d866639af8?source=rss----7b722bfd1b8d---4) 2024-08-15T13:21:31Z **Level Up Your Linux-Fu: Essential Linux Skills For Cybersecurity Newbies** ⌘ [Read more](https://infosecwriteups.com/level-up-your-linux-fu-essential-linux-skills-for-cybersecurity-newbies-7a4d92521ac0?source=rss----7b722bfd1b8d---4) 2024-08-16T13:21:36Z **Forced SSO Session Fixation** ⌘ [Read more](https://infosecwriteups.com/forced-sso-session-fixation-5d3b457b79cb?source=rss----7b722bfd1b8d---4) 2024-08-19T10:25:11Z **How Quantum Computing Will Impact Your Cybersecurity Career**
[![](https://cdn-images-1.medium.com/max/2600/1*aH-7LXdJJ4csTPre32gHlg.png)](https://infosecwriteups.com/how-quantum-computing-will-impact-your-cybersecurity-career-452c2f4e084d?source=rss----7b722bfd1b8d---4)

Is Quantum Computing Just hype Or A Game-changer ?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-quantum-computing-will-impact-your-cybersecu ... ⌘ [Read more](https://infosecwriteups.com/how-quantum-computing-will-impact-your-cybersecurity-career-452c2f4e084d?source=rss----7b722bfd1b8d---4) 2024-08-19T10:24:03Z **The Unlikely Cyberattack via Smart Coffee Machines**
[![](https://cdn-images-1.medium.com/max/600/1*fTcrBlaPCxTkz_7Wf4RRUQ.jpeg)](https://infosecwriteups.com/the-unlikely-cyberattack-via-smart-coffee-machines-6993bb50a01e?source=rss----7b722bfd1b8d---4)

In the year 2024, GlobalFinance Corp., a leading financial firm, faced a surprising cybersecurity breach involving their office’s smart…

[Continue reading on InfoSec Write-ups »](https://infosecwr ... ⌘ [Read more](https://infosecwriteups.com/the-unlikely-cyberattack-via-smart-coffee-machines-6993bb50a01e?source=rss----7b722bfd1b8d---4) 2024-08-22T08:10:00Z **Exposing Source Code via SVN: A $400 Discovery** ⌘ [Read more](https://infosecwriteups.com/exposing-source-code-via-svn-a-400-discovery-9fc54b3f3f31?source=rss----7b722bfd1b8d---4) 2024-08-22T08:07:17Z **Discover Your Target’s OS with Just a Ping Command**
[![](https://cdn-images-1.medium.com/max/785/1*wUoRBAwNnrL3ShroDel3hg.png)](https://infosecwriteups.com/discover-your-targets-os-with-just-a-ping-command-e742b189462c?source=rss----7b722bfd1b8d---4)

How you can find which OS your target is running with just a simple command called…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/discover-your-targets-os-with-just-a-ping-com ... ⌘ [Read more](https://infosecwriteups.com/discover-your-targets-os-with-just-a-ping-command-e742b189462c?source=rss----7b722bfd1b8d---4) 2024-08-22T08:20:46Z **The Power of Multi-Factor Authentication: Securing Your Digital World**
[![](https://cdn-images-1.medium.com/max/2000/1*IBo_w-WFYkGHsxwOFHsITA.jpeg)](https://infosecwriteups.com/the-power-of-multi-factor-authentication-securing-your-digital-world-45a8c6ac40ef?source=rss----7b722bfd1b8d---4)

Why Adding Extra Layers of Security Makes All the Difference

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-power ... ⌘ [Read more](https://infosecwriteups.com/the-power-of-multi-factor-authentication-securing-your-digital-world-45a8c6ac40ef?source=rss----7b722bfd1b8d---4) 2024-08-22T08:19:22Z **AS-REP Roasting: The Consequence of Disabling Kerberos Preauthentication** ⌘ [Read more](https://infosecwriteups.com/as-rep-roasting-the-consequence-of-disabling-kerberos-preauthentication-9237ff7e8896?source=rss----7b722bfd1b8d---4) 2024-08-22T08:17:01Z **Microsoft Sentinel- Custom Data Connector for Azure VMware Solution (AVS)** ⌘ [Read more](https://infosecwriteups.com/microsoft-sentinel-custom-data-connector-for-azure-vmware-solution-avs-c7a4484cd269?source=rss----7b722bfd1b8d---4) 2024-08-22T08:14:43Z **CVE-2018–7600: When Drupalgeddon Strikes**
[![](https://cdn-images-1.medium.com/max/2600/0*RxTH0cEwNv63uSmp)](https://infosecwriteups.com/cve-2018-7600-when-drupalgeddon-strikes-b2b5acc071f6?source=rss----7b722bfd1b8d---4)

An Inside Look into CVE-2018–7600, aka Drupalgeddon 2: The Remote Code Execution

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/cve-2018-7600-when-drupalgeddon-strikes-b2b5acc071f6?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/cve-2018-7600-when-drupalgeddon-strikes-b2b5acc071f6?source=rss----7b722bfd1b8d---4) 2024-08-22T12:38:34Z **All in One TryHackMe Write-up**
[![](https://cdn-images-1.medium.com/max/927/1*QLzOa52HXcuVLxlfNbAcDQ.png)](https://infosecwriteups.com/all-in-one-tryhackme-write-up-303eaa2caa8?source=rss----7b722bfd1b8d---4)

Source: TryHackMe

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/all-in-one-tryhackme-write-up-303eaa2caa8?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/all-in-one-tryhackme-write-up-303eaa2caa8?source=rss----7b722bfd1b8d---4) 2024-08-22T12:38:30Z **Cracking Windows 10 hashes** ⌘ [Read more](https://infosecwriteups.com/cracking-windows-10-hashes-59c8a7fc775f?source=rss----7b722bfd1b8d---4) 2024-08-22T12:38:26Z **Bounty Hacker Write-up, TryHackMe**
[![](https://cdn-images-1.medium.com/max/1920/1*UKi8Fj-E7o6wo8aR6An22A.jpeg)](https://infosecwriteups.com/bounty-hacker-write-up-tryhackme-4afca1389f5a?source=rss----7b722bfd1b8d---4)

Hello world !

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/bounty-hacker-write-up-tryhackme-4afca1389f5a?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/bounty-hacker-write-up-tryhackme-4afca1389f5a?source=rss----7b722bfd1b8d---4) 2024-08-22T12:38:08Z **Zyxel’s Achilles Heel: Uncovering CVE-2022–30525 — The Remote Code Execution That Will Make You…**
A Fun Dive into Command Injection Vulnerabilities, Shodan Hunts, and Why You Shouldn’t Underestimate Your Router’s Security

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/zyxels-achilles-heel-uncovering-cve-2022-30525-the-remote-code-execution-that-will-make-you-499f0afd5abc?source=rss-- ... ⌘ [Read more](https://infosecwriteups.com/zyxels-achilles-heel-uncovering-cve-2022-30525-the-remote-code-execution-that-will-make-you-499f0afd5abc?source=rss----7b722bfd1b8d---4) 2024-08-22T12:36:49Z **Creating a Vulnerable Active Directory Lab for Active Directory Penetration Testing**
[![](https://cdn-images-1.medium.com/max/625/1*UyTm8VmjNIBJ4g3aK70WYg.png)](https://infosecwriteups.com/creating-a-vulnerable-active-directory-lab-for-active-directory-penetration-testing-eafa15edd709?source=rss----7b722bfd1b8d---4)

Vulnerable Active Directory (AD) refers to an Active Directory environment that is intentionally co ... ⌘ [Read more](https://infosecwriteups.com/creating-a-vulnerable-active-directory-lab-for-active-directory-penetration-testing-eafa15edd709?source=rss----7b722bfd1b8d---4) 2024-08-22T12:36:41Z **Cracking the Cisco Code: Unmasking CVE-2021–1472 in RV Series Devices**
[![](https://cdn-images-1.medium.com/max/619/1*t-1SokVGpPg0FOTzU9l6-Q.png)](https://infosecwriteups.com/cracking-the-cisco-code-unmasking-cve-2021-1472-in-rv-series-devices-e4e31a14f7cc?source=rss----7b722bfd1b8d---4)

A Shodan Adventure into Cisco’s Web-Based Management Vulnerability

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/crack ... ⌘ [Read more](https://infosecwriteups.com/cracking-the-cisco-code-unmasking-cve-2021-1472-in-rv-series-devices-e4e31a14f7cc?source=rss----7b722bfd1b8d---4) 2024-08-22T12:36:01Z **Preventing SQL Injection** ⌘ [Read more](https://infosecwriteups.com/best-practices-for-preventing-sql-injection-in-your-code-6f30d649156b?source=rss----7b722bfd1b8d---4) 2024-08-22T12:35:48Z **Usage HackTheBox Write-up** ⌘ [Read more](https://infosecwriteups.com/usage-hackthebox-write-up-0672e9155384?source=rss----7b722bfd1b8d---4) 2024-08-22T12:35:34Z **Markdown Language: Simplifying Formatting in the Digital World**
[![](https://cdn-images-1.medium.com/max/702/1*upJGsVazgckYBLcSVmkd5w.png)](https://infosecwriteups.com/markdown-language-simplifying-formatting-in-the-digital-world-fc88ebb3f1f0?source=rss----7b722bfd1b8d---4)

Introduction

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/markdown-language-simplifying-formatting-in-the-digital-world-fc88ebb3f1f0?sourc ... ⌘ [Read more](https://infosecwriteups.com/markdown-language-simplifying-formatting-in-the-digital-world-fc88ebb3f1f0?source=rss----7b722bfd1b8d---4) 2024-08-22T12:35:22Z **Crack Complex password**
[![](https://cdn-images-1.medium.com/max/827/1*NdKS6_XlTAKmFcuFgKaryA.png)](https://infosecwriteups.com/crack-complex-password-bf2c648537d3?source=rss----7b722bfd1b8d---4)

In today's era lot of people put in complex passwords which makes it hard for us to hack their Accounts but in this blog, I am going to…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/crack-complex-password-bf2c648537d3?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/crack-complex-password-bf2c648537d3?source=rss----7b722bfd1b8d---4) 2024-08-26T13:42:41Z **Downloading VMware Fusion and Workstation 17 Pro Free**
[![](https://cdn-images-1.medium.com/max/2600/0*drArQBH_7lwz7oO_)](https://infosecwriteups.com/downloading-vmware-fusion-and-workstation-17-pro-free-2b8dfd59cd3e?source=rss----7b722bfd1b8d---4)

This is how you do it.

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/downloading-vmware-fusion-and-workstation-17-pro-free-2b8dfd59cd3e?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/downloading-vmware-fusion-and-workstation-17-pro-free-2b8dfd59cd3e?source=rss----7b722bfd1b8d---4) 2024-08-26T13:42:40Z **How Do I Secure Your CI/CD Pipeline?** ⌘ [Read more](https://infosecwriteups.com/how-do-i-secure-your-ci-cd-pipeline-afc8e6ee5c44?source=rss----7b722bfd1b8d---4) 2024-08-26T13:42:38Z **I Tried 5 Firebird Projects in PostgreSQL — Here’s How They Worked** ⌘ [Read more](https://infosecwriteups.com/i-tried-5-firebird-projects-in-postgresql-heres-how-they-worked-9949d045e12c?source=rss----7b722bfd1b8d---4) 2024-08-26T13:42:27Z **Solving the Prompt Airlines CTF** ⌘ [Read more](https://infosecwriteups.com/solving-the-prompt-airlines-ctf-2235c725050b?source=rss----7b722bfd1b8d---4) 2024-08-26T13:42:06Z **Unlocking OAuth Security** ⌘ [Read more](https://infosecwriteups.com/unlocking-oauth-security-1c57475ab286?source=rss----7b722bfd1b8d---4) 2024-08-26T13:41:22Z **Windows System Files Every Cyber Analyst Should Know** ⌘ [Read more](https://infosecwriteups.com/windows-system-files-every-cyber-analyst-should-know-7549b0044004?source=rss----7b722bfd1b8d---4) 2024-08-26T13:41:16Z **Uncovering CVE-2021–42013: The Forgotten RCE Vulnerability** ⌘ [Read more](https://infosecwriteups.com/uncovering-cve-2021-42013-the-forgotten-rce-vulnerability-f1b237ef8c91?source=rss----7b722bfd1b8d---4) 2024-08-26T13:41:13Z **CVE-2024–31982: When a Simple Wiki Search Turns into a RCE Party**
[![](https://cdn-images-1.medium.com/max/946/1*SpdZ2wXUo4ampGcBNEuxbQ.png)](https://infosecwriteups.com/cve-2024-31982-when-a-simple-wiki-search-turns-into-a-rce-party-abd9d34cf0e3?source=rss----7b722bfd1b8d---4)

XWiki’s Sneaky Database Search Vulnerability & How I Found Vulnerable Instances on Shodan

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c ... ⌘ [Read more](https://infosecwriteups.com/cve-2024-31982-when-a-simple-wiki-search-turns-into-a-rce-party-abd9d34cf0e3?source=rss----7b722bfd1b8d---4) 2024-08-26T13:41:04Z **10 Essential SSH Server Security Tips & Best Practices** ⌘ [Read more](https://infosecwriteups.com/10-essential-ssh-server-security-tips-best-practices-b5643e3d509b?source=rss----7b722bfd1b8d---4) 2024-08-26T13:40:44Z **How I Got an Appreciation Letter from NASA for Finding a Simple Bug**
[![](https://cdn-images-1.medium.com/max/600/1*YWYGttkLtY4sYOvY9gbbNA.png)](https://infosecwriteups.com/how-i-got-an-appreciation-letter-from-nasa-for-finding-a-simple-bug-8812852d0337?source=rss----7b722bfd1b8d---4)

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-i-got-an-appreciation-letter-from-nasa-for-finding-a-simple-bug-8812852d0 ... ⌘ [Read more](https://infosecwriteups.com/how-i-got-an-appreciation-letter-from-nasa-for-finding-a-simple-bug-8812852d0337?source=rss----7b722bfd1b8d---4) 2024-08-27T02:57:25Z **Exploring ARP Poisoning: A Practical Lab Guide to Understanding and Implementing Spoofing Attacks**
[![](https://cdn-images-1.medium.com/max/1200/1*mwz7WnBmLq4xGnZ5gA7ckA.png)](https://infosecwriteups.com/exploring-arp-poisoning-a-practical-lab-guide-to-understanding-and-implementing-spoofing-attacks-d8513c3fc958?source=rss----7b722bfd1b8d---4)

Introduction

[Continue reading on InfoSec Write-ups »](ht ... ⌘ [Read more](https://infosecwriteups.com/exploring-arp-poisoning-a-practical-lab-guide-to-understanding-and-implementing-spoofing-attacks-d8513c3fc958?source=rss----7b722bfd1b8d---4) 2024-08-27T14:41:40Z **Your Car’s Secret Weakness: The Hidden Dangers of Bluetooth** ⌘ [Read more](https://infosecwriteups.com/your-cars-secret-weakness-the-hidden-dangers-of-bluetooth-6af570e6726b?source=rss----7b722bfd1b8d---4) 2024-08-28T14:41:41Z **Asymmetric Returns: How MSSPs are Using Automation to Outcompete One Another** ⌘ [Read more](https://infosecwriteups.com/asymmetric-returns-how-mssps-are-using-automation-to-outcompete-one-another-7d466eaf989f?source=rss----7b722bfd1b8d---4) 2024-08-28T14:41:41Z **Chamilo LMS 1.11.14: Analysis of Two Blind SQL Injection Vulnerabilities** ⌘ [Read more](https://infosecwriteups.com/chamilo-lms-1-11-14-analysis-of-two-blind-sql-injection-vulnerabilities-c04643fe637d?source=rss----7b722bfd1b8d---4) 2024-09-01T19:12:28Z **Writeup: Path mapping for web cache deception @ PortSwigger Academy** ⌘ [Read more](https://infosecwriteups.com/writeup-path-mapping-for-web-cache-deception-portswigger-academy-184ae04ca4c7?source=rss----7b722bfd1b8d---4) 2024-09-01T19:12:09Z **A Story About How I Found XSS in ASUS** ⌘ [Read more](https://infosecwriteups.com/a-story-about-how-i-found-xss-in-asus-cb233ce3bb9c?source=rss----7b722bfd1b8d---4) 2024-09-01T19:12:07Z **What is /etc/passwd group shadow file in Linux**
[![](https://cdn-images-1.medium.com/max/750/1*WVeLIZXX25RLNlSQGuyENg.png)](https://infosecwriteups.com/what-is-etc-passwd-group-shadow-file-in-linux-bd7b28f353f3?source=rss----7b722bfd1b8d---4)

Passwd is a file where information related to the user is stored such as name, user id, group id,gecos field, home directory, and command…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/wh ... ⌘ [Read more](https://infosecwriteups.com/what-is-etc-passwd-group-shadow-file-in-linux-bd7b28f353f3?source=rss----7b722bfd1b8d---4) 2024-09-01T19:12:03Z **Understanding the Dark Web: Myths vs. Reality**
[![](https://cdn-images-1.medium.com/max/650/1*loTh0hJau9adXvnAgW51eQ.png)](https://infosecwriteups.com/understanding-the-dark-web-myths-vs-reality-bc5add10c4c1?source=rss----7b722bfd1b8d---4)

Understanding the Dark Web: Myths vs. Reality

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/understanding-the-dark-web-myths-vs-reality-bc5add10c4c1?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/understanding-the-dark-web-myths-vs-reality-bc5add10c4c1?source=rss----7b722bfd1b8d---4) 2024-09-01T19:11:58Z **Unicast, Multicast, and Broadcast: Mastering Network Communication Essentials for Optimal…**
[![](https://cdn-images-1.medium.com/max/2048/1*z_I0A7Yrk8J6kxTnwdkkvA.jpeg)](https://infosecwriteups.com/unicast-multicast-and-broadcast-mastering-network-communication-essentials-for-optimal-e92b5b1c6035?source=rss----7b722bfd1b8d---4)

Update on me

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ ... ⌘ [Read more](https://infosecwriteups.com/unicast-multicast-and-broadcast-mastering-network-communication-essentials-for-optimal-e92b5b1c6035?source=rss----7b722bfd1b8d---4) 2024-09-01T19:11:55Z **AI-Driven Ghostwriter: The 2024 Ransomware That Knows You Better Than You Know Yourself**
[![](https://cdn-images-1.medium.com/max/600/1*dhHz_ODt1h3DzfYbHe--7Q.jpeg)](https://infosecwriteups.com/ai-driven-ghostwriter-the-2024-ransomware-that-knows-you-better-than-you-know-yourself-79d8fae08c99?source=rss----7b722bfd1b8d---4)

Problem:

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ai-drive ... ⌘ [Read more](https://infosecwriteups.com/ai-driven-ghostwriter-the-2024-ransomware-that-knows-you-better-than-you-know-yourself-79d8fae08c99?source=rss----7b722bfd1b8d---4) 2024-09-01T19:11:47Z **How to Get Started in Bug Bounty Hunting: A Comprehensive Beginner’s Guide** ⌘ [Read more](https://infosecwriteups.com/how-to-get-started-in-bug-bounty-hunting-a-comprehensive-beginners-guide-4cdaf3dcd910?source=rss----7b722bfd1b8d---4) 2024-09-01T19:11:45Z **The Discovery of CVE-2024–5947: Authentication Bypass in Deep Sea Electronics DSE855** ⌘ [Read more](https://infosecwriteups.com/the-discovery-of-cve-2024-5947-authentication-bypass-in-deep-sea-electronics-dse855-5fa2e89cbdfb?source=rss----7b722bfd1b8d---4) 2024-09-01T19:11:40Z **Certified AI/ML Pentester (C-AI/MLPen) Review** ⌘ [Read more](https://infosecwriteups.com/certified-ai-ml-pentester-c-ai-mlpen-review-f465bcdef8ef?source=rss----7b722bfd1b8d---4) 2024-09-01T19:11:38Z **The Hunt for XXE to LFI: How I Uncovered CVE-2019–9670 in a Bug Bounty Program** ⌘ [Read more](https://infosecwriteups.com/the-hunt-for-xxe-to-lfi-how-i-uncovered-cve-2019-9670-in-a-bug-bounty-program-5668e4afa806?source=rss----7b722bfd1b8d---4) 2024-09-04T14:47:35Z **OSCP is not the same anymore** ⌘ [Read more](https://infosecwriteups.com/oscp-is-not-the-same-anymore-82b93a7aca58?source=rss----7b722bfd1b8d---4) 2024-09-10T09:42:36Z **Essential Windows Network Commands Every SOC Analyst Must Know**
[![](https://cdn-images-1.medium.com/max/2309/1*9OUSsuwODmEjbjpOQvrxeA.png)](https://infosecwriteups.com/essential-windows-network-commands-every-soc-analyst-must-know-cd1187b9e8f7?source=rss----7b722bfd1b8d---4)

Mastering these commands will empower you to effectively investigate and respond to network security incidents

[Continue reading on InfoSec Write-ups »](https:/ ... ⌘ [Read more](https://infosecwriteups.com/essential-windows-network-commands-every-soc-analyst-must-know-cd1187b9e8f7?source=rss----7b722bfd1b8d---4) 2024-09-10T09:42:20Z **Mastering Reconnaissance with Nmap: Unveiling Your Target’s Secrets**
[![](https://cdn-images-1.medium.com/max/959/1*zinZEbFGHoD7ay5ux3iwPQ.png)](https://infosecwriteups.com/mastering-reconnaissance-with-nmap-unveiling-your-targets-secrets-ec940d05a140?source=rss----7b722bfd1b8d---4)

Nmap (Network Mapper) is one of the most powerful and widely-used open-source tools for network discovery and security auditing. It’s a…

[Continue rea ... ⌘ [Read more](https://infosecwriteups.com/mastering-reconnaissance-with-nmap-unveiling-your-targets-secrets-ec940d05a140?source=rss----7b722bfd1b8d---4) 2024-09-10T09:41:40Z **Would you mind to tell me what your bank balance is? No? Okay, I’ll hack it.** ⌘ [Read more](https://infosecwriteups.com/would-you-mind-to-tell-me-what-your-bank-balance-is-no-okay-ill-hack-it-b3f49810cfe2?source=rss----7b722bfd1b8d---4) 2024-09-10T09:41:26Z **How to Actually Learn Hacking in 2024–25 : A Practical Guide**
[![](https://cdn-images-1.medium.com/max/888/0*6Eb2HEs6Ve2qQcqy.jpg)](https://infosecwriteups.com/how-to-actually-learn-hacking-in-2024-25-a-practical-guide-faaca1dda42b?source=rss----7b722bfd1b8d---4)

Author- Satyam Pathania

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-actually-learn-hacking-in-2024-25-a-practical-guide-faaca1dda42b?source=rss- ... ⌘ [Read more](https://infosecwriteups.com/how-to-actually-learn-hacking-in-2024-25-a-practical-guide-faaca1dda42b?source=rss----7b722bfd1b8d---4) 2024-09-10T09:41:05Z **A Story About How I Found CVE-2024–24919 in Sony’s HackerOne Program (and Ended Up Getting Swag)** ⌘ [Read more](https://infosecwriteups.com/a-story-about-how-i-found-cve-2024-24919-in-sonys-hackerone-program-and-ended-up-getting-swag-394c6dd18c04?source=rss----7b722bfd1b8d---4) 2024-09-10T09:40:59Z **My recon methodology for hunting CVE-2021–42063 led to discovering an RXSS vulnerability in the…** ⌘ [Read more](https://infosecwriteups.com/my-recon-methodology-for-hunting-cve-2021-42063-led-to-discovering-an-rxss-vulnerability-in-the-80bd4ca0f623?source=rss----7b722bfd1b8d---4) 2024-09-10T09:40:45Z **Unauthorized Deletion of Forms by Low-Level Unlicensed Users: A 500$ Access Control Bug**
[![](https://cdn-images-1.medium.com/max/1920/1*eRuzEys3CMib5CPV-cKSbQ.jpeg)](https://infosecwriteups.com/unauthorized-deletion-of-forms-by-low-level-unlicensed-users-a-500-access-control-bug-98dc50c8c193?source=rss----7b722bfd1b8d---4)

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/unauthorized-deleti ... ⌘ [Read more](https://infosecwriteups.com/unauthorized-deletion-of-forms-by-low-level-unlicensed-users-a-500-access-control-bug-98dc50c8c193?source=rss----7b722bfd1b8d---4) 2024-09-10T09:37:01Z **What is WAF? & Secret Techniques to Bypass It**
[![](https://cdn-images-1.medium.com/max/787/1*0zjQjdMk42ChsTYIXIO7Wg.png)](https://infosecwriteups.com/what-is-waf-secret-techniques-to-bypass-it-2a4de4768131?source=rss----7b722bfd1b8d---4)

WAF (Web Application Firewall): A tool designed to filter and monitor HTTP/HTTPS traffic, preventing attacks on web applications at the…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/what-is-waf ... ⌘ [Read more](https://infosecwriteups.com/what-is-waf-secret-techniques-to-bypass-it-2a4de4768131?source=rss----7b722bfd1b8d---4) 2024-09-10T09:36:56Z **Here’s Why I Don’t Suggest People to Get into Cybersecurity**
[![](https://cdn-images-1.medium.com/max/1280/1*7rWyxnjbrOchKI4EHyARBA.png)](https://infosecwriteups.com/heres-why-i-don-t-suggest-people-to-get-into-cybersecurity-38cc301e4bbf?source=rss----7b722bfd1b8d---4)

What Most Won’t Tell You About a Career in Cybersecurity

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/heres-why-i-don-t-suggest-people-to-get-into ... ⌘ [Read more](https://infosecwriteups.com/heres-why-i-don-t-suggest-people-to-get-into-cybersecurity-38cc301e4bbf?source=rss----7b722bfd1b8d---4) 2024-09-10T09:36:18Z **850$ IDOR:Unauthorized Session Revokation of any user** ⌘ [Read more](https://infosecwriteups.com/850-idor-unauthorized-session-revokation-of-any-user-93f9cb92fdfe?source=rss----7b722bfd1b8d---4) 2024-09-11T11:54:38Z **Google Safe Browsing Blacklisting Due to Website Compromise**
[![](https://cdn-images-1.medium.com/max/875/1*2-hpRqfYZxwEk7oVhx-jFw.png)](https://infosecwriteups.com/google-safe-browsing-blacklisting-due-to-website-compromise-1d57af2a0513?source=rss----7b722bfd1b8d---4)

When a website is compromised, it becomes a potential threat to visitors, leading to its inclusion in Google’s Safe Browsing blacklist…

[Continue reading on InfoSec Write ... ⌘ [Read more](https://infosecwriteups.com/google-safe-browsing-blacklisting-due-to-website-compromise-1d57af2a0513?source=rss----7b722bfd1b8d---4) 2024-09-11T11:49:09Z **Large-Scale Data Exfiltration: Exploiting Secrets in .env Files to Compromise Cloud Accounts** ⌘ [Read more](https://infosecwriteups.com/large-scale-data-exfiltration-exploiting-secrets-in-env-files-to-compromise-cloud-accounts-107dce22e601?source=rss----7b722bfd1b8d---4) 2024-09-22T23:35:39Z **DoS and DDoS** ⌘ [Read more](https://infosecwriteups.com/dos-and-ddos-31fef729aec2?source=rss----7b722bfd1b8d---4) 2024-09-22T23:35:33Z **A Simple yet Powerful Elastic SIEM Lab Project**
[![](https://cdn-images-1.medium.com/max/988/1*XsfrcnXnQ0V6y91G97R5QQ.jpeg)](https://infosecwriteups.com/a-simple-yet-powerful-elastic-siem-lab-project-6129ac1ee10e?source=rss----7b722bfd1b8d---4)

In this guide, I’ll walk you through setting up a home lab for Elastic Stack Security Information and Event Management (SIEM) using the…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/a ... ⌘ [Read more](https://infosecwriteups.com/a-simple-yet-powerful-elastic-siem-lab-project-6129ac1ee10e?source=rss----7b722bfd1b8d---4) 2024-09-22T23:35:31Z **How to Set Up Your Hacking Machine  — Complete Beginner Edition**
[![](https://cdn-images-1.medium.com/max/600/1*TPmZi2J35hCsWPGu2oAp5g.jpeg)](https://infosecwriteups.com/how-to-set-up-your-hacking-machine-complete-beginner-edition-23358f70caac?source=rss----7b722bfd1b8d---4)

Well hello there , Hi i m Satyam , a cybersecurity passionate and content writer .. I love writing about Tech, Cybersecurity and framing…

[Continue reading on Info ... ⌘ [Read more](https://infosecwriteups.com/how-to-set-up-your-hacking-machine-complete-beginner-edition-23358f70caac?source=rss----7b722bfd1b8d---4) 2024-09-22T23:35:24Z **Windows Processes Exploited: Uncovering Hacker Tactics for Persistence**
[![](https://cdn-images-1.medium.com/max/2600/1*XK2W1yMsiKVJOdCEyN7qCg.png)](https://infosecwriteups.com/windows-processes-exploited-uncovering-hacker-tactics-for-persistence-df189130b2f5?source=rss----7b722bfd1b8d---4)

A Dive into How Attackers Manipulate Common Windows Processes to Evade Detection and Maintain Control

[Continue reading on InfoSec Write-u ... ⌘ [Read more](https://infosecwriteups.com/windows-processes-exploited-uncovering-hacker-tactics-for-persistence-df189130b2f5?source=rss----7b722bfd1b8d---4) 2024-09-22T23:35:17Z **Top Reconnaissance Tools for Ethical Security Testing**
[![](https://cdn-images-1.medium.com/max/787/1*d8OgqDx6BW3EmS_sTVv9lg.png)](https://infosecwriteups.com/top-reconnaissance-tools-for-ethical-security-testing-2b4088106b81?source=rss----7b722bfd1b8d---4)

Introduction

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/top-reconnaissance-tools-for-ethical-security-testing-2b4088106b81?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/top-reconnaissance-tools-for-ethical-security-testing-2b4088106b81?source=rss----7b722bfd1b8d---4) 2024-09-22T23:34:22Z **Threat Modelling 101: Mapping OWASP Top 10 to STRIDE** ⌘ [Read more](https://infosecwriteups.com/threat-modeling-101-mapping-owasp-top-10-to-stride-cb8e8613e396?source=rss----7b722bfd1b8d---4) 2024-09-22T23:34:20Z **Threat Modeling 102: Applying STRIDE to Payments Architecture** ⌘ [Read more](https://infosecwriteups.com/threat-modeling-102-applying-stride-to-payments-architecture-f0f542fc1698?source=rss----7b722bfd1b8d---4) 2024-09-22T23:34:05Z **YARA Rules: Empower Your Security With Custom Detections**
[![](https://cdn-images-1.medium.com/max/1920/1*PmhgqzsvWE29v6pN0BYJEQ.jpeg)](https://infosecwriteups.com/yara-rules-empower-your-security-with-custom-detections-2001fa5a9710?source=rss----7b722bfd1b8d---4)

Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them.

[Continue reading on InfoSec Write-ups »](https://infosecwri ... ⌘ [Read more](https://infosecwriteups.com/yara-rules-empower-your-security-with-custom-detections-2001fa5a9710?source=rss----7b722bfd1b8d---4) 2024-09-22T23:34:02Z **Dark Web : A Journey into Hidden Networks and Black Markets** ⌘ [Read more](https://infosecwriteups.com/dark-web-a-journey-into-hidden-networks-and-black-markets-6637727eb3f5?source=rss----7b722bfd1b8d---4) 2024-09-22T23:33:49Z **Writeup: Exploiting exact-match cache rules for web cache deception @ PortSwigger Academy** ⌘ [Read more](https://infosecwriteups.com/writeup-exploiting-exact-match-cache-rules-for-web-cache-deception-portswigger-academy-1e788a712ace?source=rss----7b722bfd1b8d---4) 2024-09-22T23:47:02Z **HTB | Help -GraphQL and Blind SQL** ⌘ [Read more](https://infosecwriteups.com/htb-help-graphql-and-blind-sql-5967ecebf9e1?source=rss----7b722bfd1b8d---4) 2024-09-22T23:47:00Z **Pfsense Installation and Configuration Guide** ⌘ [Read more](https://infosecwriteups.com/pfsense-installation-and-configuration-71559299dd7b?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:57Z **Virus Detection through PfSense & Log forwarding to Wazuh** ⌘ [Read more](https://infosecwriteups.com/virus-detection-through-pfsense-log-forwarding-to-wazuh-bf35418ee785?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:53Z **From GitHub Recon to Hotstar Admin Access: A Deep Dive into Security Flaws** ⌘ [Read more](https://infosecwriteups.com/from-github-recon-to-hotstar-admin-access-a-deep-dive-into-security-flaws-2e4ae0ec937e?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:46Z **PeakLight Campaign — MSHTA** ⌘ [Read more](https://infosecwriteups.com/peaklight-campaign-mshta-a7f45aec50ab?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:37Z **Open-Source Intelligence (OSINT): A Powerful Tool for Information Gathering 2024–2025**
[![](https://cdn-images-1.medium.com/max/946/1*dLoAjZD-O0JC-4tOigll2Q.png)](https://infosecwriteups.com/open-source-intelligence-osint-a-powerful-tool-for-information-gathering-2024-2025-2b23d983b2b8?source=rss----7b722bfd1b8d---4)

Open-source intelligence (OSINT) is an essential tool for cyber security professionals. It involves ... ⌘ [Read more](https://infosecwriteups.com/open-source-intelligence-osint-a-powerful-tool-for-information-gathering-2024-2025-2b23d983b2b8?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:33Z **Top Cybersecurity Certifications For Beginners in 2024 and 2025: All You Need To Know**
[![](https://cdn-images-1.medium.com/max/2600/0*Cd6h8cIR7D7eYJWu)](https://infosecwriteups.com/top-cybersecurity-certifications-for-beginners-in-2024-and-2025-all-you-need-to-know-fa1dc198e106?source=rss----7b722bfd1b8d---4)

Cybersecurity certifications are vital for getting a job in the industry. Let’s see what certifications ... ⌘ [Read more](https://infosecwriteups.com/top-cybersecurity-certifications-for-beginners-in-2024-and-2025-all-you-need-to-know-fa1dc198e106?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:25Z **Top Websites to Learn Hacking and Compete in Capture the Flag (CTF)**
[![](https://cdn-images-1.medium.com/max/600/1*W1wt9LR1VQPQR-sqC8Pw1A.gif)](https://infosecwriteups.com/top-websites-to-learn-hacking-and-compete-in-capture-the-flag-ctf-ec5c18ecfd70?source=rss----7b722bfd1b8d---4)

Hi i m Satyam , a cybersecurity passionate and content writer .. I love writing about Tech, Cybersecurity and framing my journey from a…

[Continue rea ... ⌘ [Read more](https://infosecwriteups.com/top-websites-to-learn-hacking-and-compete-in-capture-the-flag-ctf-ec5c18ecfd70?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:23Z **Top 10 Cybersecurity-Related Movies You Should Watch**
[![](https://cdn-images-1.medium.com/max/1024/0*U3saThW8C17T2J0O)](https://infosecwriteups.com/top-10-cybersecurity-related-movies-you-should-watch-c3b1b2ce2666?source=rss----7b722bfd1b8d---4)

Cybersecurity isn’t just confined to code, firewalls, or pentesting — it’s a high-stakes world that has inspired some of the most exciting…

[Continue reading on InfoSec Write-ups »](https://infosecwri ... ⌘ [Read more](https://infosecwriteups.com/top-10-cybersecurity-related-movies-you-should-watch-c3b1b2ce2666?source=rss----7b722bfd1b8d---4) 2024-09-22T23:46:08Z **Escape Unveiled: Active Directory ADCS Exploit Walkthrough** ⌘ [Read more](https://infosecwriteups.com/escape-unveiled-active-directory-adcs-exploit-walkthrough-85cf58d3185b?source=rss----7b722bfd1b8d---4) 2024-09-29T23:49:54Z **Modded Versions of Popular Android Apps Used to Distribute New Variant of Necro Malware**
[![](https://cdn-images-1.medium.com/max/2600/0*cVq1Zgy5qYk3cpj7)](https://infosecwriteups.com/modded-versions-of-popular-android-apps-used-to-distribute-new-variant-of-necro-malware-ccb3ccd8c57d?source=rss----7b722bfd1b8d---4)

A recent investigation by Kaspersky has uncovered a new wave of malicious activity involving mod ... ⌘ [Read more](https://infosecwriteups.com/modded-versions-of-popular-android-apps-used-to-distribute-new-variant-of-necro-malware-ccb3ccd8c57d?source=rss----7b722bfd1b8d---4) 2024-09-29T23:49:43Z **Going Crazy with Farming VDPs: Extplorer Admin Panel Bypass & Remote Code Execution (RCE)** ⌘ [Read more](https://infosecwriteups.com/going-crazy-with-farming-vdps-extplorer-admin-panel-bypass-remote-code-execution-rce-ed6ae27bbce9?source=rss----7b722bfd1b8d---4) 2024-09-29T23:49:41Z **OffSec Play Lab: DC-1 Walkthrough**
[![](https://cdn-images-1.medium.com/max/1355/1*-3VoboHzHaDPO3sD2zudZA.png)](https://infosecwriteups.com/offsec-play-lab-dc-1-walkthrough-88d207b57acc?source=rss----7b722bfd1b8d---4)

A Beginner-Friendly Linux Box

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/offsec-play-lab-dc-1-walkthrough-88d207b57acc?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/offsec-play-lab-dc-1-walkthrough-88d207b57acc?source=rss----7b722bfd1b8d---4) 2024-09-29T23:49:22Z **Will Software Updates lead to Cyberattacks ?**
[![](https://cdn-images-1.medium.com/max/1600/1*MZ-5Zaa7821GNH46mtwYWg.png)](https://infosecwriteups.com/will-software-updates-lead-to-cyberattacks-38d629f565cb?source=rss----7b722bfd1b8d---4)

Software updates are critical for keeping systems functioning by fixing known vulnerabilities, so how can they contribute to cyberattacks…

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/will-soft ... ⌘ [Read more](https://infosecwriteups.com/will-software-updates-lead-to-cyberattacks-38d629f565cb?source=rss----7b722bfd1b8d---4) 2024-09-29T23:55:04Z **The Hidden Gem of Pentest Certifications in 2024**
[![](https://cdn-images-1.medium.com/max/1792/1*fhzkxmj36dc3zPy_jEFvHw.png)](https://infosecwriteups.com/the-hidden-gem-of-pentest-certifications-in-2024-67fa7a5b57cc?source=rss----7b722bfd1b8d---4)

Kick-start your penetration test career with this attractive and cheap certification

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-hidden-gem-of-pentest-certifications-in-202 ... ⌘ [Read more](https://infosecwriteups.com/the-hidden-gem-of-pentest-certifications-in-2024-67fa7a5b57cc?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:55Z **Understanding Inconsistencies in IP Address Classification Across Programming Languages** ⌘ [Read more](https://infosecwriteups.com/understanding-inconsistencies-in-ip-address-classification-across-programming-languages-19b2645b10a9?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:53Z **Powershell Network Commandes**
[![](https://cdn-images-1.medium.com/max/2200/1*dgeVA-Z75Gsj8znMMH4zoQ.jpeg)](https://infosecwriteups.com/powershell-network-commandes-63bf4f612ef9?source=rss----7b722bfd1b8d---4)

Explore the Strengths of PowerShell for Efficient Network Management and Troubleshooting

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/powershell-network-commandes-63bf4f612ef9?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/powershell-network-commandes-63bf4f612ef9?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:50Z **Packet Sniffing with Python: A Beginner’s Guide** ⌘ [Read more](https://infosecwriteups.com/packet-sniffing-with-python-a-beginners-guide-7d4e749d80a3?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:47Z **Mastering the New CompTIA CASP+ Exam: What’s Changed and How to Prepare**
[![](https://cdn-images-1.medium.com/max/1024/1*7TB98vDAdDsj2dAG5g33_w.png)](https://infosecwriteups.com/mastering-the-new-comptia-casp-exam-whats-changed-and-how-to-prepare-81c1f75d1985?source=rss----7b722bfd1b8d---4)

Stay Ahead in Cybersecurity: Key Updates and Expert Tips for CASP+ Success

[Continue reading on InfoSec Write-ups »](https://infosecwriteup ... ⌘ [Read more](https://infosecwriteups.com/mastering-the-new-comptia-casp-exam-whats-changed-and-how-to-prepare-81c1f75d1985?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:40Z **Exploiting a Logic Bug in Discount Codes Generation** ⌘ [Read more](https://infosecwriteups.com/exploiting-a-logic-bug-in-discount-code-generation-a7f624bb396f?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:37Z **What is Bug Bounty**
[![](https://cdn-images-1.medium.com/max/626/0*8zu3Icbok1VNEtyP.jpg)](https://infosecwriteups.com/what-is-bug-bounty-fc9fe6a73e16?source=rss----7b722bfd1b8d---4)

What is a bug?

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/what-is-bug-bounty-fc9fe6a73e16?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/what-is-bug-bounty-fc9fe6a73e16?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:28Z **Setup Guide for OffSec’s Free Play Lab**
[![](https://cdn-images-1.medium.com/max/2302/1*SyEuIPu24oykjXgIEEXCOQ.png)](https://infosecwriteups.com/setup-guide-for-offsecs-free-play-lab-da9bfd004674?source=rss----7b722bfd1b8d---4)

All you need is an internet connection to start hacking

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/setup-guide-for-offsecs-free-play-lab-da9bfd004674?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/setup-guide-for-offsecs-free-play-lab-da9bfd004674?source=rss----7b722bfd1b8d---4) 2024-09-29T23:54:23Z **Subdomain Takeovers for Beginners**
[![](https://cdn-images-1.medium.com/max/2600/0*QDFlsejmSZA0s9KO)](https://infosecwriteups.com/subdomain-takeovers-for-beginners-a51ed74db543?source=rss----7b722bfd1b8d---4)

How to find and exploit subdomain takeovers

[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/subdomain-takeovers-for-beginners-a51ed74db543?source=rss----7b722bfd1b8d---4) ⌘ [Read more](https://infosecwriteups.com/subdomain-takeovers-for-beginners-a51ed74db543?source=rss----7b722bfd1b8d---4)