#hacking
Read more stories on Hashnode
Articles with this tag
Hello everyone, This is my first report. I am sure everyone will be aware of the first P1 vulnerability which is the most invisible of all(the strike...
Hello everybody, Today I will try to explain how serialization vulnerabilities work. Before we destroy the pyramids, we need to learn how they built...
Hello everyone, Last week, I was waiting for test accounts to pentest a mobile application. So at this time, I decided to look for a bug bounty. I...
Hi everyone, I decided to write a guide about finding logical bugs on applications like the web, mobile, and desktop. Actually, this write-up will not...
Hello everyone, I decided to tell you my stories about offensive security. This is the first story I share on my blog. Hope it will be a good start....
Introduction: Hi all! In this article I’m going to be tackling Awkward, a medium difficulty Linux machine on hackthebox.com. Happy...