Reference Pages
H4CKING
https://infosecwriteups.com/beginners-ctf-guide-finding-hidden-data-in-images-e3be9e34ae0d
https://blog.bytebytego.com/p/password-session-cookie-token-jwt-ec1
https://www.codelivly.com/web-application-hacking/
https://infosecwriteups.com/lets-hacking-citizens-bank-9520e9c05cf9
https://cybersecuritynews.com/hackers-use-weaponized-pdf-files-to-attack-organizations/
Networking
https://www.codelivly.com/network-pivoting/
https://www.codelivly.com/how-hackers-remotely-control-any-servers-with-reverse-shell/
Linux
https://www.phoronix.com/news/Rocky-Linux-RHEL-Source-Access
https://www.debugpoint.com/why-kali-linux/
https://hackaday.com/2023/05/22/dear-ubuntu/
https://beebom.com/how-take-screenshot-ubuntu/
Windows
https://mspoweruser.com/how-to-get-admin-rights-on-windows-10-without-password/
https://www.pinkvilla.com/tech/how-to/how-to-create-windows-10-bootable-usb-1223213
XSS
https://infosecwriteups.com/mastering-xss-a-comprehensive-guide-for-bug-bounty-hunters-fc4e2b4ad1f1
ASM
https://www.phoronix.com/news/Linus-Torvalds-Relax-Inline-ASM
Tools
Malware
https://infosecwriteups.com/analyzing-malware-using-free-online-tools-e37b56bc3868
https://www.theregister.com/2023/06/23/camaro_dragon_usb_malware_spreads/
https://thehackernews.com/2023/06/new-golang-based-skuld-malware-stealing.html
https://protos.com/mamma-mia-crypto-malware-hidden-in-super-mario-game/
Encryption
https://www.freecodecamp.org/news/encryption-explained-in-plain-english/
https://www.androidpolice.com/end-to-end-encryption-explainer/
https://www.design-reuse.com/news/53919/xiphera-ascon-lightweight-cryptographic-suite.html
Wfi
Lowlevel
https://www.techspot.com/news/98300-microsoft-explains-how-detect-blacklotus-uefi-bootkit-infection.html
https://hackaday.com/2023/04/22/build-your-own-bootable-emacs-environment/
https://beebom.com/how-update-bios-uefi/
https://beebom.com/how-update-bios-uefi/
https://totallygamerjet.hashnode.dev/writing-an-os-in-go-the-bootloader
https://www.freecodecamp.org/news/how-to-access-and-read-ram-contents/
WebSites
https://nakedsecurity.sophos.com/2023/07/04/ghostscript-bug-could-allow-rogue-documents-to-run-system-commands/
https://www.blackhatethicalhacking.com/articles/post-exploitation-techniques-maintaining-access-escalating-privileges-gathering-credentials-covering-tracks/
https://latesthackingnews.com/2023/06/26/serious-idor-vulnerability-found-in-microsoft-teams/
https://office365itpros.com/2023/06/26/teams-external-access-exploit/
https://blog.sucuri.net/2023/06/remote-code-execution-backdoor-uses-unicode-obfuscation-non-standard-file-extensions.html
https://infosecwriteups.com/easy-csrf-bypass-7226b4e3593e
https://www.youtube.com/watch?v=ULvtr1Os3EE
https://thehackernews.com/2023/06/adversary-in-middle-attack-campaign.html
https://cleancommit.io/blog/spa-vs-mpa-which-is-the-king/
https://blog.redteam-pentesting.de/2023/storing-passwords/
https://www.codelivly.com/mastering-capture-the-flag-challenges/
https://infosecwriteups.com/bug-bounty-hunting-methodology-tools-tips-tricks-blogs-books-6f84cda7ce34
https://infosecwriteups.com/send-email-from-anyone-to-any-user-outlook-microsoft-69fce333066d
https://www.crowdstrike.com/blog/identifying-data-exfiltration-in-moveit-transfer-investigations/
https://gbhackers.com/millions-of-pc-motherboard/
https://www.codelivly.com/exploring-the-world-of-intrusion-detection-and-prevention-systems/
https://www.codelivly.com/how-hackers-remotely-control-any-servers-with-reverse-shell/
https://www.youtube.com/watch?v=rKaCdAxQikY
https://www.securityweek.com/google-temporarily-offering-180000-for-full-chain-chrome-exploit/
https://www.youtube.com/watch?v=_uVVVV_nIhE
https://hackaday.com/2023/06/02/chatting-about-the-state-of-hacker-friendly-ar-gear/
https://infosecwriteups.com/path-traversal-vulnerability-28d6de8fb5d7
https://gbhackers.com/google-ctf-2023/
https://news.itsfoss.com/sniffnet/
https://lifehacker.com/windows-is-finally-getting-support-for-rar-and-7z-archi-1850478854
https://pimylifeup.com/raspberry-pi-unbound/
https://www.securityweek.com/zyxel-firewalls-hacked-by-mirai-botnet-via-recently-patched-vulnerability/
https://www.freecodecamp.org/news/use-apis-to-practice-coding-skills/
https://hackaday.com/2023/05/21/watch-a-web-page-fetch-itself-over-tls-complete-with-commentary/
https://twitter.com/hackinarticles/status/1670359855306088449?t=D5zSgAbgdYF4MK9VoDZgnA&s=08
https://beej.us/guide/bgnet/html/split/
https://latesthackingnews.com/2023/05/22/impacket-cheatsheet-for-penetration-testers/
https://mspoweruser.com/how-to-get-admin-rights-on-windows-10-without-password/
https://www.omglinux.com/raspberry-pi-os-update-may-2023/
https://practical365.com/find-azure-ad-users-powershell/
https://build-your-own.org/blog/20230507_byoc_new/?v=20230507
https://www.csoonline.com/article/3695769/review-your-on-prem-adcs-infrastructure-before-attackers-do-it-for-you.html
https://4pfsec.com/oswe
https://vulncheck.com/blog/papercut-rce
https://4sysops.com/archives/resolve-dnsname-nslookup-for-powershell/
https://totallygamerjet.hashnode.dev/writing-an-os-in-go-the-bootloader
https://latesthackingnews.com/2023/04/30/wifi-penetration-testing-cheatsheet-for-ethical-hackers
https://www.codelivly.com/web-application-hacking/
https://unix.stackexchange.com/questions/744369/why-xargs-does-not-process-the-last-argument
https://www.sentinelone.com/blog/mastering-the-art-of-soc-analysis-part-1-2/
https://www.hackerone.com/hackerone-community-blog/getting-started-high-school-bug-hunter-cubeds-hacker-afk
https://infosecwriteups.com/unveiling-the-secrets-my-journey-of-hacking-googles-oss-cdd9ef3c7aa
https://www.blackhatethicalhacking.com/news/chinese-hacking-group-apt41-caught-using-google-tool-for-data-theft/
https://infosecwriteups.com/how-i-escalated-default-credentials-to-remote-code-execution-1c34504be7a5
No comments:
Post a Comment