Mustafa KhanA Deep Dive into Attacks on TLS: Understanding TLS 1.2 and TLS 1.3 from a Hacker’s PerspectiveTransport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication over a computer network. Despite its…5h ago5h ago
Yash Pawar @HackersParadiseExploiting Windows Remote Management (WinRM)Windows Remote Management (WinRM) is a remote access protocol built into Windows to facilitate remote interaction with systems over HTTP or…8h ago8h ago
Yash Pawar @HackersParadiseEternalBlue (MS17–010/CVE-2017–0144): Exploit and Vulnerability OverviewEternalBlue (MS17–010/CVE-2017–0144) is a critical vulnerability in the Windows SMBv1 protocol that allows attackers to remotely execute…8h ago8h ago
codingboltReflected DOM XSSCross-Site Scripting (XSS) vulnerabilities have plagued the web for years, allowing attackers to inject malicious scripts into websites…10h ago10h ago
Muhammad Hammad KhanHackPark-TryHackMeBruteforce a websites login with Hydra, identify and use a public exploit then escalate your privileges on this Windows machine!12h ago12h ago
researcher greyDetecting Common Vulnerabilities in Network VAPT: Strategies and SolutionsNetwork Vulnerability Assessment and Penetration Testing (VAPT) are essential processes in modern cybersecurity. These practices help…13h ago13h ago
DasmanishLLMNR poisoning (Practical)LLMNR is a protocol that allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local network without requiring a…17h ago17h ago
D4nYeDCTF Write-up: Resolviendo el Desafío “Descryptor” en TheHackersLabsEsta CTF de la plataforma The hackers labs nos mostró la importancia de los lenguajes esotéricos, como Brainfuck, para ocultar información…1d ago1d ago