Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

How Misconfigurations in Linux can leave you vulnerable to Attackers

How Misconfigurations in Linux can leave you vulnerable to Attackers

Security misconfigurations in Linux systems occur when necessary security controls are not properly implemented for servers or web applications. In this article, we’ll emphasize the importance of detecting and addressing misconfigurations through practical examples and tools like Nmap and the Metasploit Framework.

read more
How do QR Codes work and how criminal hackers use them to generate phishing attacks – Demo

How do QR Codes work and how criminal hackers use them to generate phishing attacks – Demo

In this article, we’ll explore the pervasive presence and potential risks associated with QR codes in daily life. We’ll discuss the ease with which malicious QR codes can be created, either manually or through specialized tools, allowing attackers to embed harmful payloads. A tutorial its included, emphasizing its role in creating various types of malicious QR codes for security testing purposes.

read more
Red Team Tactics to uncover hidden Secrets on Websites

Red Team Tactics to uncover hidden Secrets on Websites

In this article, we’ll demonstrate red team tactics for uncovering hidden secrets on websites. Despite security layers that companies deploy, such as Cloudflare WAF and next-generation firewalls, attackers can exploit sensitive information embedded in code, such as API keys and tokens.

read more