Premium Content Subscribe to Patreon to watch this episode. Watch a crontab related episode below: Reading Time: 6 Minutes Introduction Cron is named after the Greek word "Chronos" which translates to "time"....
read more
A Hacker’s Guide to Subdomain Enumeration
Enumeration is key when it comes to hacking; enumerating subdomains leads to discovering many untouched surfaces with vulnerabilities. By understanding how to uncover more hidden subdomains a target has, you can significantly increase coverage, especially when performing Bug Bounty Hunting or Pentesting.
Steganography: How to hide data in images and extract them
In this article, we will put these concepts into practice by demonstrating how to utilize Steghide and Stegosuite, two tools available for Linux users.
Write up: Detect malicious hacker activities on endpoints
Introduction Welcome to the 21st century, where almost everything in life is connected to an electronic device. At one time, the term digital forensics was a synonym for computer forensics, but now involves all devices capable of storing digital...