Hacking Articles – Telegram
Hacking Articles
12.9K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Docker Architecture
1
CLI Tools for Linux Admin
1
🚀 AI Penetration Training (Online) – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Limited slots available! Hurry up to secure your spot in this exclusive training program offered by Ignite Technologies.

🧠 LLM Architecture
🔐 LLM Security Principles
🗄️ Data Security in AI Systems
🛡️ Model Security
🏗️ Infrastructure Security
📜 OWASP Top 10 for LLMs
⚙️ LLM Installation and Deployment
📡 Model Context Protocol (MCP)
🚀 Publishing Your Model Using Ollama
🔍 Introduction to Retrieval-Augmented Generation (RAG)
🌐 Making Your AI Application Public
📊 Types of Enumeration Using AI
🎯 Prompt Injection Attacks
🐞 Exploiting LLM APIs: Real-World Bug Scenarios
🔑 Password Leakage via AI Models
🎭 Indirect Prompt Injection Techniques
⚠️ Misconfigurations in LLM Deployments
👑 Exploitation of LLM APIs with Excessive Privileges
📝 Content Manipulation in LLM Outputs
📤 Data Extraction Attacks on LLMs
🔒 Securing AI Systems
🧾 System Prompts and Their Security Implications
🤖 Automated Penetration Testing with AI
2
Grep Cheat Sheet for Sysadmin
2
IP Command Cheat sheet
1
1
Comprehensive Guide on Cross-Site Scripting (XSS)

Twitter: https://lnkd.in/e7yRpDpY
🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll take a tour to Cross–Site Scripting and would learn how an attacker executes malicious JavaScript codes over at the input parameters and generates such pop-ups, in order to deface the web-application or to hijack the active user’s session.

📘 What is JavaScript?
🎯 JavaScript Event Handlers
💥 Introduction to Cross-Site Scripting (XSS)
⚠️ Impact of Cross-Site Scripting

🧬 Types of XSS
🔁 Reflected XSS
💾 Stored XSS
🧩 OM-based XSS

🎯 Cross-Site Scripting Exploitation
🔐 Credential Capturing
🍪 Cookie Capture
🧪 Fuzzing
  🧰 Burp Suite
  🕷️ XSSer

🛡️ Mitigation Steps
API Penetration Testing Training (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with Ignite Technologies’ fully exclusive Training Program "API Penetration Testing Training."

✔️ Table of Content

📘 Course Introduction
🔍 How API works with Web application
⚖️ Types of APIs and their advantages/disadvantages
🔎 Analysing HTTP request and response headers
🛡️ API Hacking methodologies
📄 Enumerate web pages and analyse functionalities
🕵️ API passive reconnaissance Strategies
🚀 API active reconnaissance (Kite runner)
🔧 Introduction to POSTMAN
🔍 Testing for Excessive data exposure
📂 Directory indexing / brute force
🔑 Password mutation
🎯 Password spray attacks against web application
🛡️ Introduction to JSON Web Token
🕵️ Hunting for JWT authentication vulnerabilities
💣 Exploiting JWT unverified signature
🔓 Cracking JWT secret keys
🚫 Bypass JWT removing signature
💉 Exploit jku header injection
🔧 Exploit KID in JSON web tokens
🔐 Attacking 0Auth 2.0
📊 Introduction to OWASP TOP 10 API
⚔️ Hunting and exploiting XXS in API
🕵️ Testing for the ReDOS attack in the API web application
💥 Exploiting XML vulnerabilities
🔧 WordPress XML-RPC attack
🌐 Exploiting WSDL/SOAP to RFI
🤖 API Automated Vulnerability scanning
💉 Testing SQL/NoSQL Injection in an API
🔓 Exploiting object-level access control
🔧 Exploiting Function level access control
📡 Testing in-band SSRF vulnerabilities in an API
🌍 Testing out-band SSRF vulnerabilities in an API
⚙️ Testing OS Command Injection
Exploiting Java deserialization vulnerabilities
🗂️ Testing for improper assets management
📦 Testing for Mass assignment vulnerabilities
🚧 Bypass filter, space, and blacklisted characters
🔐 Bypass Captcha and MFA
📋 Remediations and Reporting
1
IPv4 vs IPv6
1
CLI Tools for Linux Admin
2
Home Network Security Tips
2
Azure Cloud Servics
Password manger for Linux
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠 Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
4
Gined Access
Credential Dumping
Emerging Neurotech Risks Explained Through Restaurant Analogies

Twitter: https://x.com/hackinarticles


Understand neurotechnology’s ethical and security risks with bite-sized restaurant scenarios:

NT01 - Mental Privacy Violation
Waiter eavesdrops on diners’ thoughts → Sells preferences to advertisers
Risk: Unauthorized neural data harvesting for targeted ads.

NT02 - Brain Hacking (BCI Exploits)
Chef remotely alters a dish order → Customer forced to eat spam
Risk: Hackers hijack brain-computer interfaces (BCIs) to manipulate actions.

NT03 - Cognitive Bias Exploitation
Menu prices flash in red → Diners overpay without realizing
Risk: Neurostimulation subtly influences decisions (e.g., purchases, voting).

NT04 - Deep Brain "Chef" Tampering
Kitchen AI overrides chef’s recipes → Diners addicted to salty food
Risk: Implanted devices hacked to alter behaviors or cravings.

NT05 - Neuro-Discrimination
VIPs get premium brain upgrades → Others stuck with slow service
Risk: Socioeconomic divides widen with cognitive enhancement tech.