DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Is Hacking Possible? Security Vulnerabilities and Defense

Is Hacking Possible? Security Vulnerabilities and Defense

Comments
8 min read
Cicada Hack The Box Writeup

Cicada Hack The Box Writeup

Comments
13 min read
Computer Science Movies #2: Operation Takedown

Computer Science Movies #2: Operation Takedown

Comments
1 min read
Tales of a Novice Hardware Hacker: The Lifecycle of a Kit

Tales of a Novice Hardware Hacker: The Lifecycle of a Kit

5
Comments
2 min read
How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

1
Comments
4 min read
Understanding SQL Injection: A Major Security Threat

Understanding SQL Injection: A Major Security Threat

13
Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
SSRF retrieving temporary credentials from AWS Metadata

SSRF retrieving temporary credentials from AWS Metadata

Comments
1 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

38
Comments
20 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

70
Comments 6
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
Code Smell 284 - Encrypted Functions

Code Smell 284 - Encrypted Functions

Comments
5 min read
You Could Lose All Your Crypto In a Job Interview

You Could Lose All Your Crypto In a Job Interview

2
Comments
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

1
Comments
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

3
Comments
8 min read
Day 46: Adversarial Attacks on LLMs

Day 46: Adversarial Attacks on LLMs

1
Comments
2 min read
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
Understanding Network Hacking

Understanding Network Hacking

Comments
2 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation

The Curious Case of the $15,000 Spam: My Unexpected Investigation

18
Comments 3
2 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

1
Comments
5 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

2
Comments 2
5 min read
loading...