Hacking
Explore the world of ethical hacking and digital security in our hub section. From CTF challenges to CVE discovery, digital forensics, web security and wireless network analysis, our Hacking section is your gateway to a diverse set of cybersecurity disciplines.
..,.oooE777999V(;
...oooP779090(;'' '''' I
...ooB777979V;;'' .....=v}}=}=}=}}v== 5
97?(;'' .........< . . .:.:.:.:.`:;``;;;;;;;;<;;;<;<<<<<<<<<<
b ; . : .:.:.:.`;;;;;;;;;;;<;;<;<<<<<<<<, I
`,` . : :.:.:.:.`.`;;;;;;;;;;;;<;<;<<. 5
b ; . : .:.:.:.`;;;;;;;;;;;<;<;<: E
`,< . . .:.:.:.``;;;;;;;;;;. I
b : . . :.:.:.:.:.:.;;;. 5
`>; . .:..:.:.:.`.: |
b : . . :.:.:.x T
`,; . . .:: E
b : _ !4
`r : __.__,--,;'))))).
b : ___...--'; `))))))))' '' `>!9eOc
`r : __,--:-;;;)))))))))))'' '' ' ' _. -'-'.`!9Eg.
L : . __.--_--:,)))))))))))'' ' ' _. ._.-'-'-'-'\-'\---\/\ ``Qu.
`,: !x;:)))))))) ')'' ' _ _._-.'\'\_\_-'\''-\'_'\-'\'\ -_\'-\-. 95n.
D` ))))''' _ .___.-_:/-/\/-_\ /-_, /-,\ \-/_\/\,-\_/-\/-/--' ..v<]9o.
__b :<> -_\._/\,- ,_ -\ _/\-\ _-\ -_/-\,\/,-/\_/-_\'\--' .vvvvvvv}v}}x}]NEo.
.ooPO%LOCu `< `/\_ -:\/_/-/,\/,/-,/_,-/\ :_\:_-:__-'' ...vvvvvvvvvvvvxx}vx}}}}==No
.oPO' `y. `< ~-\ _\/\_,- \ , - ,___..--' .......>>vvvvvvvvx>vvvvvvvvvv)v~~~`
.@tTL' `y, `< .-vvv<<<<<<<<vvvvv=>~~~~` _uuua'''
.&P' `L, `>>><<<<><>v~>^` ` _uuug'
`L, ~~` _uuua''
`L,: _uuua'' iuuuaE'
Vulnerability CVE-2024-23897 in Jenkins: All You Need to Know
Analyzing Vulnerability CVE-2024-23897. Keep reading Vulnerability CVE-2024-23897 in Jenkins: All You Need to Know
Unauthenticated access to ADB Daemon
Risks of ADB Port Exposure on Android Devices Keep reading Unauthenticated access to ADB Daemon
Analyzing CVE-2024-4577
this is a deep-dive into the PHP CGI RCE vulnerability. Keep reading Analyzing CVE-2024-4577
Cross Site Scripting (XSS)
Learn what cross site scripting is and what its mechanism is. Keep reading Cross Site Scripting (XSS)
Introduction to assembly language
Learn the basic concepts necessary to analyze code in assembly language. Keep reading Introduction to assembly language
Basic Binary Analysis
Learn the procedure to perform basic binary analysis on Linux. Keep reading Basic Binary Analysis
Essential tools for image forensics
Learn how the tools used to analyze images work. Keep reading Essential tools for image forensics
Subnetting
Learn how subnetting works Keep reading Subnetting
Permissions in Linux
Learn how permissions work in Linux Keep reading Permissions in Linux
Evil-Twin and Evil-Portal Attack
Capturing credentials via an Evil Portal attack using a Pineapple WiFi Keep reading Evil-Twin and Evil-Portal Attack