HTB | Help -GraphQL and Blind SQL ⌘ Read more
Pfsense Installation and Configuration Guide ⌘ Read more
Virus Detection through PfSense & Log forwarding to Wazuh ⌘ Read more
From GitHub Recon to Hotstar Admin Access: A Deep Dive into Security Flaws ⌘ Read more
PeakLight Campaign — MSHTA ⌘ Read more
Open-Source Intelligence (OSINT): A Powerful Tool for Information Gathering 2024–2025
Open-source intelligence (OSINT) is an essential tool for cyber security professionals. It involves … ⌘ Read more
Top Cybersecurity Certifications For Beginners in 2024 and 2025: All You Need To Know
Cybersecurity certifications are vital for getting a job in the industry. Let’s see what certifications … ⌘ Read more
Top Websites to Learn Hacking and Compete in Capture the Flag (CTF)
Hi i m Satyam , a cybersecurity passionate and content writer .. I love writing about Tech, Cybersecurity and framing my journey from a…
[Continue rea … ⌘ Read more
Top 10 Cybersecurity-Related Movies You Should Watch
Cybersecurity isn’t just confined to code, firewalls, or pentesting — it’s a high-stakes world that has inspired some of the most exciting…
[Continue reading on InfoSec Write-ups »](https://infosecwri … ⌘ Read more
Escape Unveiled: Active Directory ADCS Exploit Walkthrough ⌘ Read more
DoS and DDoS ⌘ Read more
A Simple yet Powerful Elastic SIEM Lab Project
In this guide, I’ll walk you through setting up a home lab for Elastic Stack Security Information and Event Management (SIEM) using the…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/a … ⌘ Read more
How to Set Up Your Hacking Machine — Complete Beginner Edition
Well hello there , Hi i m Satyam , a cybersecurity passionate and content writer .. I love writing about Tech, Cybersecurity and framing…
[Continue reading on Info … ⌘ Read more
Windows Processes Exploited: Uncovering Hacker Tactics for Persistence
A Dive into How Attackers Manipulate Common Windows Processes to Evade Detection and Maintain Control
[Continue reading on InfoSec Write-u … ⌘ Read more
Threat Modelling 101: Mapping OWASP Top 10 to STRIDE ⌘ Read more
Threat Modeling 102: Applying STRIDE to Payments Architecture ⌘ Read more
YARA Rules: Empower Your Security With Custom Detections
Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them.
[Continue reading on InfoSec Write-ups »](https://infosecwri … ⌘ Read more
Dark Web : A Journey into Hidden Networks and Black Markets ⌘ Read more
Writeup: Exploiting exact-match cache rules for web cache deception @ PortSwigger Academy ⌘ Read more
Google Safe Browsing Blacklisting Due to Website Compromise
When a website is compromised, it becomes a potential threat to visitors, leading to its inclusion in Google’s Safe Browsing blacklist…
[Continue reading on InfoSec Write … ⌘ Read more
Large-Scale Data Exfiltration: Exploiting Secrets in .env Files to Compromise Cloud Accounts ⌘ Read more
Essential Windows Network Commands Every SOC Analyst Must Know
Mastering these commands will empower you to effectively investigate and respond to network security incidents
[Continue reading on InfoSec Write-ups »](https:/ … ⌘ Read more
Mastering Reconnaissance with Nmap: Unveiling Your Target’s Secrets
Nmap (Network Mapper) is one of the most powerful and widely-used open-source tools for network discovery and security auditing. It’s a…
[Continue rea … ⌘ Read more
Would you mind to tell me what your bank balance is? No? Okay, I’ll hack it. ⌘ Read more
How to Actually Learn Hacking in 2024–25 : A Practical Guide
Author- Satyam Pathania
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-actually-learn-hacking-in-2024-25-a-practical-guide-faaca1dda42b?source=rss- … ⌘ Read more
A Story About How I Found CVE-2024–24919 in Sony’s HackerOne Program (and Ended Up Getting Swag) ⌘ Read more
My recon methodology for hunting CVE-2021–42063 led to discovering an RXSS vulnerability in the… ⌘ Read more
Unauthorized Deletion of Forms by Low-Level Unlicensed Users: A 500$ Access Control Bug
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/unauthorized-deleti … ⌘ Read more
What is WAF? & Secret Techniques to Bypass It
WAF (Web Application Firewall): A tool designed to filter and monitor HTTP/HTTPS traffic, preventing attacks on web applications at the…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/what-is-waf … ⌘ Read more
Here’s Why I Don’t Suggest People to Get into Cybersecurity
What Most Won’t Tell You About a Career in Cybersecurity
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/heres-why-i-don-t-suggest-people-to-get-into … ⌘ Read more
850$ IDOR:Unauthorized Session Revokation of any user ⌘ Read more