π A story about SSRF vs CSRF - explained
π https://hacklido.com/blog/309-a-story-about-ssrf-vs-csrf-explained
π https://hacklido.com/blog/309-a-story-about-ssrf-vs-csrf-explained
HACKLIDO
A story about SSRF vs CSRF - explained
There are two friends of cybersecurity experts, Eve and Charlie. Eve is a fresher security analyst for a tech company, and Charlie is an experienced secur...
π1
π WAF Bypass + XSS on The MOST Popular Movie Ticket website.
π https://hacklido.com/blog/310-waf-bypass-xss-on-the-most-popular-movie-ticket-website
π https://hacklido.com/blog/310-waf-bypass-xss-on-the-most-popular-movie-ticket-website
HACKLIDO
WAF Bypass + XSS on The MOST Popular Movie Ticket website.
Hi all, This is the first time I was writing this blog, so I will let you know the story of how I got the XSS on one of the popular entertaining websites....
π1
π My experience on Hacking Dutch Government
π https://hacklido.com/blog/312-my-experience-on-hacking-dutch-government
π https://hacklido.com/blog/312-my-experience-on-hacking-dutch-government
HACKLIDO
My experience on Hacking Dutch Government
Hey guys , Today iβm gonna share my experience on hacking Dutch government website. Myself V1draX , a passionate cyber security enthusiast and a keen...
π2
π What it takes to make a Cybersecurity Career?, What kind of skillset is required?, What kind of technologies should be learnt in-depth?, etc...
π¬ Give your views in the comments below.
π¬ Give your views in the comments below.
π Facebook OSINT (Use Facebook like a Pro)
π https://hacklido.com/blog/313-facebook-osint-use-facebook-like-a-pro
π https://hacklido.com/blog/313-facebook-osint-use-facebook-like-a-pro
HACKLIDO
Facebook OSINT (Use Facebook like a Pro)
An easy-to-learn guide on Facebook osint by @dheerajydv19 Pre-requisites - a basic understanding of kali Linux and a pc/laptop with a good internet connec...
π Subdomain Takeover: The Easy Way
π https://hacklido.com/blog/315-subdomain-takeover-the-easy-way
π https://hacklido.com/blog/315-subdomain-takeover-the-easy-way
HACKLIDO
Subdomain Takeover: The Easy Way
Hey guys, this is me @dheerajydv19 and in todayβs blog, we will learn everything you need to know about subdomain takeover. I have read almost 25 reports on...
π4π₯1
π Cracking the Code: How to Uncover Email Addresses with a GitHub Username
π https://hacklido.com/blog/317-cracking-the-code-how-to-uncover-email-addresses-with-a-github-username
π https://hacklido.com/blog/317-cracking-the-code-how-to-uncover-email-addresses-with-a-github-username
HACKLIDO
Cracking the Code: How to Uncover Email Addresses with a GitHub Username
Hey guys, itβs me @dheerajydv19, and recently while using Twitter, I came across some new techniques i.e how can we find a GitHub userβs email? Letβs lear...
π2π₯1
π XSS (Cross-Site Scripting)- Explained In Layman's Term
π https://hacklido.com/blog/318-xss-cross-site-scripting-explained-in-laymans-term
π https://hacklido.com/blog/318-xss-cross-site-scripting-explained-in-laymans-term
HACKLIDO
XSS (Cross-Site Scripting)- Explained In Layman's Term
In this blog, you will learn What is XSS? How does XSS works? What are the types of XSS? How to find and test for XSS? Impact of XSS How to prevent XSS a...
β€2π₯1
π What are JWT Tokens? How to bypass Auth and Mitigations
π https://hacklido.com/blog/319-what-are-jwt-tokens-how-to-bypass-auth-and-mitigations
π https://hacklido.com/blog/319-what-are-jwt-tokens-how-to-bypass-auth-and-mitigations
HACKLIDO
What are JWT Tokens? How to bypass Auth and Mitigations
Topics Covered What are JWT Tokens ? What is the structure of JWT Tokens ? How Attackers Use It To Bypass Authentication ? How to Mitigate JWT Tokens Atta...
π1
π How I got a $2000 bounty with RXSS
π https://hacklido.com/blog/320-how-i-got-a-2000-bounty-with-rxss
π https://hacklido.com/blog/320-how-i-got-a-2000-bounty-with-rxss
HACKLIDO
How I got a $2000 bounty with RXSS
Hi fellow hunters, in this write-up, I will explain how I found a reflected cross-site scripting bug and showed multiple attack scenarios. The target I was...
π Blue Team Bootcamp Series (P3): How to Detect Cross-Site Scripting (XSS) Attacks
π https://hacklido.com/blog/321-blue-team-bootcamp-series-p3-how-to-detect-cross-site-scripting-xss-attacks
π https://hacklido.com/blog/321-blue-team-bootcamp-series-p3-how-to-detect-cross-site-scripting-xss-attacks
HACKLIDO
Blue Team Bootcamp Series (P3): How to Detect Cross-Site Scripting (XSS) Attacks
Hello Friend π In this part, weβre going to cover the common WEB Attack known as XSS (Cross-Site Scripting) Prerequisite: Basic knowledge about How Attac...
π 30 Days - 30 APISecurity Tests | Akto.io
π Join us for 30days of daily API security tests - #30days30tests. Weβve spent last 120 days building amazing API security tests for the community. Next 30 days we will post test tutorials here.
π https://hacklido.com/blog/323-30-days-30-apisecurity-tests-aktoio
π Join us for 30days of daily API security tests - #30days30tests. Weβve spent last 120 days building amazing API security tests for the community. Next 30 days we will post test tutorials here.
π https://hacklido.com/blog/323-30-days-30-apisecurity-tests-aktoio
π3β€1π₯1π€©1
π How I got $$$$ Bounty within 5 mins
π https://hacklido.com/blog/325-how-i-got-bounty-within-5-mins
π https://hacklido.com/blog/325-how-i-got-bounty-within-5-mins
HACKLIDO
How I got $$$$ Bounty within 5 mins
Hi folks, Usually I donβt do writeups or share anything related to a bug bounty. From now I will be sharing my experience and knowledge & hope it will ad...
π Understanding Buffer Overflow Vulnerabilities [Part 1] - Memory layout and the Call Stack | A full fledged series on Buffer Overflow basics and its Vulnerabilties, More parts coming soon.
π https://hacklido.com/blog/328-understanding-buffer-overflow-vulnerabilities-part-1-memory-layout-and-the-call-stack
π https://hacklido.com/blog/328-understanding-buffer-overflow-vulnerabilities-part-1-memory-layout-and-the-call-stack
HACKLIDO
Understanding Buffer Overflow Vulnerabilities [Part 1] - Memory layout and the Call Stack
Introduction Greetings and welcome to a fresh series of articles. When I started on my expedition to explore the Information Security domain, there was t...
π Boot Kali from USB with a Flash, Become a Hacking Pro in a Dash!
π https://hacklido.com/blog/327-boot-kali-from-usb-with-a-flash-become-a-hacking-pro-in-a-dash
π https://hacklido.com/blog/327-boot-kali-from-usb-with-a-flash-become-a-hacking-pro-in-a-dash
HACKLIDO
Boot Kali from USB with a Flash, Become a Hacking Pro in a Dash!
Introduction Are you ready to become a master of cybersecurity and uncover hidden vulnerabilities in computer systems? Look no further than Kali Linux, the...
π2
π¨Hacklido presents you a FREE webinar on "Recon For BugBounty" in collaboration with Agnibha Dutta a.k.a Anon_Y0gi
Webinar Details:
- Platform: Google Meet
- Date: March 05, 2023 | Sunday
- Timing: 5:00 - 7:00 pm
To Register, Click on the following link , to receive the invite link for the respective webinar: https://forms.gle/ZrS8dcaQ1ejag29f6
[LIMITED SEATS upto 100]
Join us soon!!π₯
Webinar Details:
- Platform: Google Meet
- Date: March 05, 2023 | Sunday
- Timing: 5:00 - 7:00 pm
To Register, Click on the following link , to receive the invite link for the respective webinar: https://forms.gle/ZrS8dcaQ1ejag29f6
[LIMITED SEATS upto 100]
Join us soon!!π₯
π₯6β€2π2
π How I hacked an exam portal and got access to 10K+ users data including webcams
π https://hacklido.com/blog/332-how-i-hacked-an-exam-portal-and-got-access-to-10k-users-data-including-webcams
π https://hacklido.com/blog/332-how-i-hacked-an-exam-portal-and-got-access-to-10k-users-data-including-webcams
HACKLIDO
How I hacked an exam portal and got access to 10K+ users data including webcams
Hello guys, I am Faique a security researcher and a bug bounty hunter and I welcome you to my write-up on a story of a hack that I did a couple of months ago...
π3