Home
sujay adkesar
Cancel

img Bypassing 2 Factor Authentication Techniques 🔐

Introduction Two-Factor Authentication (2FA) is a robust security measure, but no system is flawless. In this blog post, we will explore advanced techniques to bypass 2FA, uncovering potential ...

img S3 Bucket Misconfiguration!

Misconfigurations Of S3 Bucket Introduction: Amazon S3 buckets, a fundamental component of cloud storage, are often a target for security researchers and VAPT (Vulnerability Assessment and Pe...

img Billion Laugh Attack

The Billion Laughs Attack: A Threat to XML Parsing Introduction XML parsing vulnerabilities continue to be a focal point for security researchers, and one particularly menacing exploit is the...

imgBroken Link Hijacking

Br0k3n L1nk Hij@ck1ng Introduction In the realm of bug bounty hunting, uncovering vulnerabilities that may compromise a website’s security is a thrilling challenge. One often-overlooked aspect ...

img Ericzimmerman Tools | Windows Forensics

Forensic tools Name Version (.net 4 | 6) Purpose AmcacheParser 1.5.1.0 | 1.5.1.0 Amcache.hve parser with lots of ...

img Security Identifieres | Windows Forensics

Understanding Security Identifiers (SIDs) in Active Directory Security Identifiers (SIDs) play a crucial role in Windows Server’s Active Directory Domain Services (AD DS). SIDs are unique alph...

img Anonymous | Tryhackme | Walkthrough

Nmap ┌──(root㉿kali)-[/home/kali] └─# nmap -sV -sC -T4 10.10.215.229 Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-12-14 07:04 EST Nmap scan report for 10.10.215.229 Host is up (0.24s late...

img AgentSudo | Tryhackme | Walkthrough

Nmap ┌──(root㉿kali)-[/home/kali] └─# nmap -sV -sC 10.10.69.110 Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-12-14 01:02 EST Nmap scan report for 10.10.69.110 Host is up (0.21s latency). ...

front-page port 80-shoopyu Password Reset Vulnerabilities

Hey, hacking enthusiasts! Ready to uncover some mind-blowing tricks? Dive into these HubSpot Full Account Takeover methods and master the hacker’s playbook! 📧 Using Your Token on Victims’ Ema...

front-page port 80-shoopyu TrueSecrets | Hack The Box | Forensics

Challenge Description Our cybercrime unit has been investigating a well-known APT group for several months. The group has been responsible for several high-profile attacks on corporate organiza...