Lesson Learnt from Bugs
3 Essential Questions to Ask Before You Scale Products
Ask before it goes "out of order"
This contains the experiments, and loopholes in code that get used right logically as per the product teams but end up screwing.
Lesson Learnt from Bugs
Ask before it goes "out of order"
Lesson Learnt from Bugs
Which of the following is a safer password? 1. wG1eqe#4D 2. therearemanyunpopularopinions General opinion: 1 is safer because it has capital, small letters, numbers, special characters, etc. It’s harder to break. Probably it will take many months to break it. It is impossible for a person to guess
Lesson Learnt from Bugs
General opinion: Being in an industry that works with organizations and not with individuals, it is considered to be useful to have their work emails to create a relationship of retention. There’s no whose account is it? disputes and easier handoff organizations. Alternate opinion: In addition to the above,
In the last article, I had shared after this article you’ll master LAN sniffing. I hope you have tried your hands on the techniques shared in it. Then, let’s go and learn. How to use Wireshark? Wireshark is an open-source packet analyzer that can be used to capture,
Lesson Learnt from Bugs
What if I tell you it can still give you this: If you’re reading this article, I assume you would know about DAN. A popular method used to get over ChatGPT before it became ChatGPT 4. Well, the more mysterious this world of AI is, the more is bypassing
With the ending of the last article, we have successfully exploited a system, now what? As a pentester, when you’ll share vulnerability with the organization, you’ll have to show them the impact. This article is about creating that level of impact. Post exploitation — The last step In post-exploitation,
Lesson Learnt from Bugs
Clients are called the weakest links to take advantage of. They get stuck into the PDF attacks like shared in the last article and email attacks. Like I had said, it’s not only about securing your server, it’s also about helping your clients to take intelligent decisions when
PDF hacking is one of the exclusive topics when working in client-side exploitation. This is about creating malicious PDF documents and providing them to the user in some way from the target. In the last article, we talked about the ways by which clients are attacked. Have you tried SET
Metasploit is a powerful tool that is used by ethical hackers to find vulnerabilities on networks and servers. It helps to find the weak spots in the network. I know, how eager you are to know about this tool. Have you completed the rest of the articles on remote exploitation?
Lesson Learnt from Bugs
The secret I’m going to tell you about is — “Control is an illusion”. The topic( SMTP exploit) will also convince you on agreeing to this quote. Have you covered the basics of remote exploitation we discussed in the last article? If not, complete that first because this is the
Everyone wants to turn their GOD mode on when looking for vulnerabilities. Indeed, we have reached that point — Remote Exploitation. This term means finding a way to access the content you don’t have access to. Once found, just wait for the AHHHH moment! Step 3: Exploiting vulnerabilities After acquiring
Step 3: Sniffing across a network Most hacking Netflix series show scenes about hacking a building network or a Wi-Fi. Would you like to know how that actually happens? If yes, let’s do it then. We’ll learn about various techniques to sniff traffic across a network. Btw, have