When solving CTF challenges or exploiting boxes you might need to know how Linux file/directory permissions work.In this post we plan to explain in a…
Ethical Hackers, Bug Hunters, pentesters, etc frequently use Nmap (short for Network Mapper), a free and open-source network scanner, to find hosts and services on…
First let’s quickly define Ethical hacking. Ethical hacking, also known as “white hat hacking” is the practice of using hacking techniques to identify and fix…
Hypertext Transfer Protocol, also known as HTTP is the communication protocol used by all of us daily when we access a website, in particular the…
Hello everyone, I struggle a lot to think of good project ideas and then actually doing them until the end, in particular cyber security projects.…
In your hacking journey you might need to manipulate an HTTP request, either change the cookies, or the user-agent, or any other part of the…