๐ What is HTTP request smuggling?
๐ https://hacklido.com/blog/834-what-is-http-request-smuggling
๐ https://hacklido.com/blog/834-what-is-http-request-smuggling
HACKLIDO
What is HTTP request smuggling?
In this section, weโll explain HTTP request smuggling attacks and describe how common request smuggling vulnerabilities can arise. HTTP request smuggling is...
๐ Win a TryHackMe monthly subscription by writing a cybersecurity blog at - https://hacklido.com
๐ This is part of writer's reward program ๐ค
๐ This is part of writer's reward program ๐ค
๐ Is Quantum Resistant Cryptography Moving Fast Enough?
๐ https://hacklido.com/blog/839-is-quantum-resistant-cryptography-moving-fast-enough
๐ https://hacklido.com/blog/839-is-quantum-resistant-cryptography-moving-fast-enough
HACKLIDO
Is Quantum Resistant Cryptography Moving Fast Enough?
Weโre focused onโฆ Whether quantum-resistant cryptography is developing fast enough to mitigate the crypto-cracking power of quantum computing. Why? Bec...
๐ง CyberWeekly 15' June | Issue #3
[?!] The Mask APT, NTLM deprecation by Microsoft 2024, GitHub phishing & extorsions, JavaScript for hackers and more.
๐ https://hacklido.substack.com/p/cyberweekly-15-june-issue-3
[?!] The Mask APT, NTLM deprecation by Microsoft 2024, GitHub phishing & extorsions, JavaScript for hackers and more.
๐ https://hacklido.substack.com/p/cyberweekly-15-june-issue-3
๐ Dumping data from the Microsoft Recall folder
๐ https://hacklido.com/blog/840-dumping-data-from-the-microsoft-recall-folder
๐ https://hacklido.com/blog/840-dumping-data-from-the-microsoft-recall-folder
HACKLIDO
Dumping data from the Microsoft Recall folder
Recently, Microsoft announced their new AI Recall feature that will be enabled on a new hardware generation called Copilot+ PC. I wonโt bore you with the...
๐ Gaining persistence on Windows with Time Providers
๐ https://hacklido.com/blog/841-gaining-persistence-on-windows-with-time-providers
๐ https://hacklido.com/blog/841-gaining-persistence-on-windows-with-time-providers
HACKLIDO
Gaining persistence on Windows with Time Providers
When authenticating into a Domain Controller using the Kerberos protocol, especially during a CTF, weโve all encountered the infamous Kerberos Clock Skew er...
๐ Why Mentoring Is Good For The Mentor
๐ https://hacklido.com/blog/842-why-mentoring-is-good-for-the-mentor
๐ https://hacklido.com/blog/842-why-mentoring-is-good-for-the-mentor
HACKLIDO
Why Mentoring Is Good For The Mentor
Weโre focused onโฆ Why being a mentor has benefits not just for the mentee, but for the person doing the mentoring too. Why? Because we asked Paulino Ca...
๐ Continuous Security For Agility And Peace Of Mind
๐ https://hacklido.com/blog/843-continuous-security-for-agility-and-peace-of-mind
๐ https://hacklido.com/blog/843-continuous-security-for-agility-and-peace-of-mind
HACKLIDO
Continuous Security For Agility And Peace Of Mind
Weโre focused onโฆ The importance of continuous security to help an organisation stay ahead of threats, act on vulnerabilities, and enable peace of mind fo...
๐ Embracing Web3 For The Future Of Cybersecurity
๐ https://hacklido.com/blog/803-embracing-web3-for-the-future-of-cybersecurity
๐ https://hacklido.com/blog/803-embracing-web3-for-the-future-of-cybersecurity
HACKLIDO
Embracing Web3 For The Future Of Cybersecurity
At Black Hat MEA 2023, Mohamed Samy (Senior Information Security Consultant at IOActive) introduced Project C-Shell โ a unique infrastructure that integrat...
๐ How To Use VDPS To Launch Your Cybersecurity Career Path
๐ https://hacklido.com/blog/844-how-to-use-vdps-to-launch-your-cybersecurity-career-path
๐ https://hacklido.com/blog/844-how-to-use-vdps-to-launch-your-cybersecurity-career-path
HACKLIDO
How To Use VDPS To Launch Your Cybersecurity Career Path
Black Hat speaker Imran Parray (Founder and CEO at Snapsec) launched his career by reporting thousands of security vulnerabilities to companies via their s...
๐ Server-side Parameter Pollution (API Testing)
๐ https://hacklido.com/blog/848-server-side-parameter-pollution-api-testing
๐ https://hacklido.com/blog/848-server-side-parameter-pollution-api-testing
HACKLIDO
Server-side Parameter Pollution (API Testing)
Server-side parameter pollution Some systems contain internal APIs that arenโt directly accessible from the internet. Server-side parameter pollution occu...
๐ง CyberWeekly 22' June | Issue #4
[?!] VDPS for career launch, LSASS decryption, Nmap port scanning. Anonymity with ProxyChains, TOR, Kali Linux, Kaspersky ban, major breaches, and cutting-edge tools.
๐ https://hacklido.substack.com/p/cyberweekly-22-june-issue-4
[?!] VDPS for career launch, LSASS decryption, Nmap port scanning. Anonymity with ProxyChains, TOR, Kali Linux, Kaspersky ban, major breaches, and cutting-edge tools.
๐ https://hacklido.substack.com/p/cyberweekly-22-june-issue-4
๐ Reverse engineering LSASS to decrypt DPAPI keys
๐ https://hacklido.com/blog/849-reverse-engineering-lsass-to-decrypt-dpapi-keys
๐ https://hacklido.com/blog/849-reverse-engineering-lsass-to-decrypt-dpapi-keys
HACKLIDO
Reverse engineering LSASS to decrypt DPAPI keys
Before you start reading this post Iโd like to point out that this is not a practical technique, no sane person would manually hunt for DPAPI blobs and d...
๐ USA Bans Kaspersky Lab - A Critical Move to Safeguard Cybersecurity
๐ https://hacklido.com/blog/850-usa-bans-kaspersky-lab-a-critical-move-to-safeguard-cybersecurity
๐ https://hacklido.com/blog/850-usa-bans-kaspersky-lab-a-critical-move-to-safeguard-cybersecurity
HACKLIDO
USA Bans Kaspersky Lab - A Critical Move to Safeguard Cybersecurity
In a decisive effort to protect national security and maintain the integrity of its information and communication technology infrastructure, the United Sta...
๐ Recent Supply Chain Cyberattacks and lessons learnt from that
๐ https://hacklido.com/blog/851-recent-supply-chain-cyberattacks-and-lessons-learnt-from-that
๐ https://hacklido.com/blog/851-recent-supply-chain-cyberattacks-and-lessons-learnt-from-that
HACKLIDO
Recent Supply Chain Cyberattacks and lessons learnt from that
Understanding Supply Chain Cyberattacks A supply chain cyberattack targets third-party vendors within an organizationโs supply chain. Historically, these a...
๐ How to Respond to Incident or Attacks & How not to screw up the crime scene
๐ https://hacklido.com/blog/852-how-to-respond-to-incident-or-attacks-how-not-to-screw-up-the-crime-scene
๐ https://hacklido.com/blog/852-how-to-respond-to-incident-or-attacks-how-not-to-screw-up-the-crime-scene
HACKLIDO
How to Respond to Incident or Attacks & How not to screw up the crime scene
โIf you canโt decipher our data, then why are you here?โ This is a common reaction when our team arrives. Now, let me explain everything while covering:...