⤷ Title: Day 15: Let’s get back to enumeration (HTB Nmap room) pt.1
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:24:50 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup #nmap #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 22:24:50 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup #nmap #hackthebox #cybersecurity
Medium
Day 15: Let’s get back to enumeration (HTB Nmap room) pt.1
During a penetration test, we have different phases : planning & reconnaissance, scanning/ enumeration, exploitation…
⤷ Title: Hacked Through a Fish Tank: The Uncomfortable Truth About Modern Cybersecurity in 2026
════════════════════════
𐀪 Author: Talal Abbasi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 00:46:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #data_privacy #infosec #cve
════════════════════════
𐀪 Author: Talal Abbasi
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 00:46:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #data_privacy #infosec #cve
Medium
Hacked Through a Fish Tank: The Uncomfortable Truth About Modern Cybersecurity in 2026
What a casino thermometer, a forgotten password, and 75 zero-days tell us about the world we are actually living in
⤷ Title: Digital Decapitation: U.S.–Israeli Cyber-Kinetic Integration Against the Iranian State
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:28:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #cyberattack #cyber #donald_trump
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:28:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #cyberattack #cyber #donald_trump
Medium
Digital Decapitation: U.S.–Israeli Cyber-Kinetic Integration Against the Iranian State
The military operations that commenced on February 28, 2026, represent a foundational shift in modern warfare doctrine, moving from an era…
⤷ Title: Hijacking an admin account through a “support access” feature
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:48 GMT
════════════════════════
⌗ Tags: #web_development #programming #cybersecurity #hacking #technology
════════════════════════
𐀪 Author: OopsSec Store
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:48 GMT
════════════════════════
⌗ Tags: #web_development #programming #cybersecurity #hacking #technology
Medium
Hijacking an admin account through a “support access” feature
One extra parameter in the request body is all it takes to own the admin.
⤷ Title: HackTheBox Blocky Writeup: From Source Code Credentials to Root
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:36:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #hackthebox #ethical_hacking #ctf_writeup
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:36:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #hackthebox #ethical_hacking #ctf_writeup
Medium
HTB Blocky
I applied various techniques like WordPress enumeration, JAR file credential extraction, and sudo binary privilege escalation via GFTObins.
⤷ Title: Cookie Tossing Attack PoC:
════════════════════════
𐀪 Author: Bazil Brohi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:20:28 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #cybersecurity #offensive_security #penetration_testing
════════════════════════
𐀪 Author: Bazil Brohi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:20:28 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #cybersecurity #offensive_security #penetration_testing
Medium
Cookie Tossing Attack PoC:
I was studying from the Web Hacking Arsenal Book by Rafay Baloch when I was introduced to two interesting vulnerabilities pertaining to…
⤷ Title: Insufficient Input Validation Attack Lab: A Hands-On Journey Through File Upload Bypass Techniques
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:40 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #penetration_testing #web_development #javanoscript
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 23:06:40 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #penetration_testing #web_development #javanoscript
Medium
Insufficient Input Validation Attack Lab: A Hands-On Journey Through File Upload Bypass Techniques
Comprehensive walkthrough of bypassing file upload restrictions using console noscripts and HTML manipulation
⤷ Title: NETSEC THM- Writeup
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 01:20:05 GMT
════════════════════════
⌗ Tags: #netsec #tryhackme_walkthrough #ctf_writeup #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cybernerddd
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 01:20:05 GMT
════════════════════════
⌗ Tags: #netsec #tryhackme_walkthrough #ctf_writeup #cybersecurity #ethical_hacking
Medium
NETSEC THM- Writeup
In this lab, I explored how full-range enumeration, service analysis, and credential attacks can uncover hidden services and sensitive…
⤷ Title: How Hackers Actually Break Into Accounts
════════════════════════
𐀪 Author: TechTales
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:02:49 GMT
════════════════════════
⌗ Tags: #technology #tech #cybersecurity #social_media #hacking
════════════════════════
𐀪 Author: TechTales
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:02:49 GMT
════════════════════════
⌗ Tags: #technology #tech #cybersecurity #social_media #hacking
Medium
How Hackers Actually Break Into Accounts
Your account doesn’t get hacked like in those dramatic movie scenes
⤷ Title: 3 Projects to Get You Into IT Security
════════════════════════
𐀪 Author: Eric Smith
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 03:33:02 GMT
════════════════════════
⌗ Tags: #infosecurity #infosec #cybersecurity #it_career #information_security
════════════════════════
𐀪 Author: Eric Smith
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 03:33:02 GMT
════════════════════════
⌗ Tags: #infosecurity #infosec #cybersecurity #it_career #information_security
Medium
3 Projects to Get You Into IT Security
Discover 3 infosec projects that are under $100 to get you started in Cybersecurity or Infosecurity by giving you hands-on experience to…
⤷ Title: TryHackMe
════════════════════════
𐀪 Author: Ravi Modhvadiya
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:17:05 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #tryhackme_walkthrough #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Ravi Modhvadiya
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:17:05 GMT
════════════════════════
⌗ Tags: #tryhackme_pre_security #tryhackme_walkthrough #cybersecurity #tryhackme
Medium
TryHackMe
Pre Security (New)
⤷ Title: Understanding React2Shell (CVE-2025–55182)
════════════════════════
𐀪 Author: Indigo Shadow
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:45:15 GMT
════════════════════════
⌗ Tags: #ethical_hacking #react2shell #cve202555182 #react_server_component #javanoscript_nextjs
════════════════════════
𐀪 Author: Indigo Shadow
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:45:15 GMT
════════════════════════
⌗ Tags: #ethical_hacking #react2shell #cve202555182 #react_server_component #javanoscript_nextjs
Medium
Understanding React2Shell (CVE-2025–55182)
The Critical RCE in React Server Components
⤷ Title: Host Header Injection: The Quiet Vulnerability That Breaks Trust
════════════════════════
𐀪 Author: Purushotham.R
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:23:22 GMT
════════════════════════
⌗ Tags: #bug_bounty #application_security #cybersecurity #web_security
════════════════════════
𐀪 Author: Purushotham.R
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:23:22 GMT
════════════════════════
⌗ Tags: #bug_bounty #application_security #cybersecurity #web_security
Medium
Host Header Injection: The Quiet Vulnerability That Breaks Trust
Most developers obsess over SQL injection, XSS, and authentication bypasses.
⤷ Title: “Stop Using Google for Recon. Seriously.”
════════════════════════
𐀪 Author: Pushkar Padhye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:58:44 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #programming #hacking #bug_bounty
════════════════════════
𐀪 Author: Pushkar Padhye
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:58:44 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #programming #hacking #bug_bounty
Medium
“Stop Using Google for Recon. Seriously.”
The Search Engine Nobody Uses (But Should) — Bing for Bug Bounty
⤷ Title: Bug Bounty Platforms: How to Choose the Right Programs (And Avoid Instant Rejection)
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:39:37 GMT
════════════════════════
⌗ Tags: #hacking #vulnerability #bug_bounty #cybersecurity #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 05:39:37 GMT
════════════════════════
⌗ Tags: #hacking #vulnerability #bug_bounty #cybersecurity #security
Medium
🎯 Bug Bounty Platforms: How to Choose the Right Programs (And Avoid Instant Rejection)
🎯 Bug Bounty Platforms: How to Choose the Right Programs (And Avoid Instant Rejection)
⤷ Title: SAST vs DAST vs SCA — The Security Trio Every DevOps Engineer Must Understand
════════════════════════
𐀪 Author: TechwidSush
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:22:55 GMT
════════════════════════
⌗ Tags: #security #devsecops #cloud_security #application_security #devsecops_solutions
════════════════════════
𐀪 Author: TechwidSush
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:22:55 GMT
════════════════════════
⌗ Tags: #security #devsecops #cloud_security #application_security #devsecops_solutions
Medium
SAST vs DAST vs SCA — The Security Trio Every DevOps Engineer Must Understand
Application Security is often ignored in traditional development workflows. But in today’s world, where applications are constantly exposed…
⤷ Title: Your Small Business Will Be Hacked. The Only Question Is When.
════════════════════════
𐀪 Author: Karan Dhillon
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:53:30 GMT
════════════════════════
⌗ Tags: #security #business #small_business #hacking #cyber_security_awareness
════════════════════════
𐀪 Author: Karan Dhillon
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 04:53:30 GMT
════════════════════════
⌗ Tags: #security #business #small_business #hacking #cyber_security_awareness
Medium
Your Small Business Will Be Hacked. The Only Question Is When.
Most small business owners believe they are too small to be targeted.
⤷ Title: No rate limit on forget/reset password leads to email triggering
════════════════════════
𐀪 Author: Arif Hossain
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:40:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Arif Hossain
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:40:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
Medium
No rate limit on forget/reset password leads to email triggering
Steps To Reproduce
⤷ Title: Holi Special Discount on Career-Oriented Cybersecurity Course
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:31:52 GMT
════════════════════════
⌗ Tags: #education #cybersecurity_training #cybersecurity #ethical_hacking #ai
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 06:31:52 GMT
════════════════════════
⌗ Tags: #education #cybersecurity_training #cybersecurity #ethical_hacking #ai
Medium
Holi Special Discount on Career-Oriented Cybersecurity Course
Why Cybersecurity Is a Smart Career Choice for Students
⤷ Title: Shopify Account Takeover via Email Verification Bypass | Bug Bounty PoC $22,500
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:35:30 GMT
════════════════════════
⌗ Tags: #account_takeover #bug_bounty_writeup #shopify #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:35:30 GMT
════════════════════════
⌗ Tags: #account_takeover #bug_bounty_writeup #shopify #bug_bounty #cybersecurity
Medium
Shopify Account Takeover via Email Verification Bypass | Bug Bounty PoC $22,500
How chaining two low-friction bugs in Shopify’s POS system allowed a full account takeover of any store without a Shopify ID
⤷ Title: Stored xss exposed cookies via .noscript in [ cisco] = P3 Bug → P1 bug
════════════════════════
𐀪 Author: Sai Jayanth
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:30:37 GMT
════════════════════════
⌗ Tags: #stored_xss #bug_bounty #cybersecurity #ato #cisco
════════════════════════
𐀪 Author: Sai Jayanth
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:30:37 GMT
════════════════════════
⌗ Tags: #stored_xss #bug_bounty #cybersecurity #ato #cisco
Medium
Stored xss exposed cookies via .noscript in [ cisco] = P3 Bug → P1 bug
Hello i’m back with one more P3 bug in Cisco .