Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)
Cover image for I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)

3
Comments
1 min read
Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP
Cover image for Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

2
Comments
3 min read
Generative AI: The Double-Edged Sword in Cloud-Native Security

Generative AI: The Double-Edged Sword in Cloud-Native Security

1
Comments
9 min read
Where it all started.

Where it all started.

1
Comments
4 min read
Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅
Cover image for Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅

Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅

Comments 1
2 min read
My first portfolio in Figma
Cover image for My first portfolio in Figma

My first portfolio in Figma

1
Comments 2
3 min read
Insecure Deserialization in Symfony: How to Prevent It
Cover image for Insecure Deserialization in Symfony: How to Prevent It

Insecure Deserialization in Symfony: How to Prevent It

3
Comments
3 min read
My Journey with the Zen of Python: Learning to Code, Learning to Grow

My Journey with the Zen of Python: Learning to Code, Learning to Grow

1
Comments 1
3 min read
SSO Security Exposed: Real-World Attack Scenarios in 2025
Cover image for SSO Security Exposed: Real-World Attack Scenarios in 2025

SSO Security Exposed: Real-World Attack Scenarios in 2025

2
Comments
3 min read
CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability
Cover image for CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability

CVE-2017-0144: Microsoft SMBv1 Remote Code Execution Vulnerability

1
Comments 3
1 min read
AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.
Cover image for AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

1
Comments
2 min read
Hacker Using Metasploit and Nmap for Offensive Security in 2025
Cover image for Hacker Using Metasploit and Nmap for Offensive Security in 2025

Hacker Using Metasploit and Nmap for Offensive Security in 2025

7
Comments
1 min read
CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability
Cover image for CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability

CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability

Comments
2 min read
Cybersecurity Certification: Your Gateway to a Secure and Rewarding Career

Cybersecurity Certification: Your Gateway to a Secure and Rewarding Career

1
Comments
2 min read
Cracking the code: How Copilot supercharged my last CTF and where it fell short

Cracking the code: How Copilot supercharged my last CTF and where it fell short

Comments 1
9 min read
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
Cover image for The Essential Guide to Web Security Scanning: Protecting Your Digital Assets

The Essential Guide to Web Security Scanning: Protecting Your Digital Assets

Comments
2 min read
My First Attempt at Writing a Windows Process Logger in Batch (Yes, It’s Ugly, but It Works)
Cover image for My First Attempt at Writing a Windows Process Logger in Batch (Yes, It’s Ugly, but It Works)

My First Attempt at Writing a Windows Process Logger in Batch (Yes, It’s Ugly, but It Works)

Comments 1
2 min read
🕵️ "We Thought It Was Secure… Until It Wasn't."
Cover image for 🕵️ "We Thought It Was Secure… Until It Wasn't."

🕵️ "We Thought It Was Secure… Until It Wasn't."

1
Comments
3 min read
Beginner’s Guide to IDS vs IPS in Cyber Security
Cover image for Beginner’s Guide to IDS vs IPS in Cyber Security

Beginner’s Guide to IDS vs IPS in Cyber Security

Comments
3 min read
From Scan to Secure: Practical Nmap Labs for Information Gathering & Pen Testing
Cover image for From Scan to Secure: Practical Nmap Labs for Information Gathering & Pen Testing

From Scan to Secure: Practical Nmap Labs for Information Gathering & Pen Testing

Comments
2 min read
CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability
Cover image for CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability

CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability

Comments
1 min read
CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability
Cover image for CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability

CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability

Comments
1 min read
CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability
Cover image for CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability

CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability

Comments
1 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
1 min read
Weak Password Policy in Symfony: Risks & Prevention
Cover image for Weak Password Policy in Symfony: Risks & Prevention

Weak Password Policy in Symfony: Risks & Prevention

2
Comments
4 min read
loading...