Tag: Password cracker

Pen-testing Technique.

暗网网址 Hidden Wiki url onion Tor links

Contents 1 Editor's picks 2 Volunteer 3 Introduction Points 4 Financial Services 5 Commercial Services 6 Domain Services 7 Anonymity & Security 8 Blogs / ... Read More

Buer, a new loader emerges in the underground marketplace
Cyber threat

Buer, a new loader emerges in the underground marketplace

Overview For several years, Proofpoint researchers have been tracking the use of first-stage downloaders, which are used by threat actors to install other forms of ... Read More

Visual Studio 2008 – XML External Entity Injection
remote code execution

Visual Studio 2008 – XML External Entity Injection

- Exploit Details # Exploit Title: Visual Studio 2008 - XML External Entity Injection # Discovery by: hyp3rlinx # Date: 2019-12-02 # Vendor Homepage: www.microsoft.com ... Read More

Breaking Down : SHA-256 Algorithm
algorithms, BugBountywriteup

Breaking Down : SHA-256 Algorithm

Breaking Down : SHA-256 AlgorithmLooking under the hood and understanding how it works?Good news folks the article that I wrote on Breaking down: SHA-1 Algorithm has been ... Read More

Chainsaw — HacktheBox
blockchain, BugBountywriteup

Chainsaw — HacktheBox

Chainsaw — HacktheBoxhackthebox.euThis is a write-up on how I solved Chainsaw from HacktheBox.Hack the Box is an online platform where you practice your penetration testing skills.As always, I ... Read More

Breaking Down : SHA-512 Algorithm
algorithms, BugBountywriteup

Breaking Down : SHA-512 Algorithm

SHA-512 AlgorithmBreaking Down : SHA-512 AlgorithmLooking under the hood and understanding how it works?I have been writing the “Breaking Down” series for past few weeks now, where ... Read More

ASIS CTF — ShareL Walkthrough
android-hook, android-security

ASIS CTF — ShareL Walkthrough

ASIS CTF — ShareL WalkthroughHello, The reader of this walkthrough should know these topics:Android application vulnerability assessmentHooking with FridaWeb application vulnerability assessmentFuzzingThe participants were given an APK. Opening the ... Read More

Breaking Down : MD5 Algorithm
BugBountywriteup, cryptography

Breaking Down : MD5 Algorithm

Breaking Down : MD5 AlgorithmLooking under the hood and understanding how it works?The previous article that I wrote was on Breaking Down : SHA-1 Algorithm. I have explained ... Read More

Breaking down : SHA-1 Algorithm
BugBountywriteup, cryptography

Breaking down : SHA-1 Algorithm

Breaking down: SHA-1 AlgorithmLooking under the hood and understanding how it works?I haven’t been blogging for the past month or so and to be true the ... Read More