4 days agoAlternate Data Streams - Good or Bad?Some people might say it’s good, others would consider it a bad thing. Well, as many elements in this world, it depends on its usage. ● What is an ADS? Imagine you have a pair of jeans, and it has a pocket in your front-left size. You go to a…Alternate5 min readAlternate5 min read
Published inSystem Weakness·Nov 5Understanding DLL hijacking - What it is and how it’s used in hackingNo, this is not about how to rob a van of a delivery company 😅. DLL hijacking is a technique used in cybersecurity. Maybe you might have already heard about it. Or you might not have any clue. Do you want to find out more? Don’t leave and get ready! …Dll5 min readDll5 min read
Published inSystem Weakness·Oct 3Explaining IP SpoofingHave you ever seen a magician performing a trick? Even though you saw something, you knew it wasn’t real, right? Well, the same thing is valid when it comes to IP spoofing. Don’t close this page, since in this article you will find out more about this topic! ● What…IP4 min readIP4 min read
Published inSystem Weakness·Sep 8SQL injectionTesla 2014, Cisco 2018, Fortnite 2019. They have one thing in common. All of them recorded vulnerabilities related to SQL injection. Such kind of vulnerability can lead to serious damage for companies, like unauthorized access to information, deletion of tables etc. ● What is SQL injection? Well, it is a…Sql8 min readSql8 min read
Published inSystem Weakness·Aug 14Developer Tools - How to use them in hackingIf you worked in web development, most probably you already know what these are. However, for some of us, this term might be a new one, so, let’s explain it. ● What are Web Developer Tools? As the name states, it is a set of tools used by web developers…Developer5 min readDeveloper5 min read
Published inInfoSec Write-ups·Jul 24TryHackMe - CaptureChallenge Link : https://tryhackme.com/room/capture Difficulty : Easy Full walkthrough video : https://www.youtube.com/watch?v=6NhaVoNeeoM (includes also the flag) Capture challenge was an interesting one, because it involved a curious topic. It required a single flag, not 2, as usual. Let me show how I found it. I was expecting to begin with…Tryhackme5 min readTryhackme5 min read
Published inSystem Weakness·Jul 11Photo Cleaner - How to delete metadata from photosDid you know some of your photos contain more information than you think? Yes, this is metadata, a bunch of data which provides various details about the photo. ● How can I see the available metadata for a photo? There are various tools which can help you verify what is…Metadata4 min readMetadata4 min read
Published inInfoSec Write-ups·Jun 13TryHackMe - SmagGrottoChallenge Link : https://tryhackme.com/room/smaggrotto Difficulty : Easy Full walkthrough video : https://www.youtube.com/watch?v=_ApM5-XD2wE (includes also the flag) Today I am going to show you how I solved SmagGrotto challenge from TryHackMe. There are 2 flags to find, user and root. In this article, I will explain how to get them. As…Tryhackme4 min readTryhackme4 min read
Published inSystem Weakness·May 16Google Dorks - How To Hack With ThemI know this term doesn’t sound very menacing, and you don’t associate it with real hacking. But, in reality, this is used in the footprinting stage of a hack. ● What are Google Dorks? Before learning how to use them, we must understand what they really are. Believe it or…Cybersecurity4 min readCybersecurity4 min read
Published inSystem Weakness·Feb 28BASE64 - How it worksSome of you might have heard about BASE64, but do you know what it is and how it works? If not, you are in the right place, this article will help you understand this algorithm. ● What is BASE64 and what is used for? Well, to keep it simple, it…Cybersecurity5 min readCybersecurity5 min read