A Hacker’s Guide to Subdomain Enumeration
Enumeration is key when it comes to hacking; enumerating subdomains leads to discovering many untouched surfaces with vulnerabilities. By understanding how to uncover more hidden subdomains a target has, you can significantly increase coverage, especially when performing Bug Bounty Hunting or Pentesting.
Lizard Squad – the infamous hacking group that brought Xbox and PlayStation networks to their knees.
Steganography: How to hide data in images and extract them
In this article, we will put these concepts into practice by demonstrating how to utilize Steghide and Stegosuite, two tools available for Linux users.