Discover the intricacies of X86 architecture and its pivotal role in cybersecurity. This guide offers a deep dive into the components and… Continue reading on InfoSec Write-ups »
NTFS FILESYSTEM A DEEP DIVE INTO CONCEPTS RELATED TO THE NTFS FILESYSTEM In this article, we will start by briefly discussing how data is stored on hard drives. Then we will take a look at the ...
https://infosecwriteups.com/ntfs-filesystem-alternate-data-stream-ads-c0e4a2402563
This write-up discusses using ScareCrow to create payload frameworks for side loading (not injecting) into a legitimate Windows process, bypassing Application Whitelisting controls. After loadi...
Dive into the world of cybersecurity and AI as we unravel the complexities of Many-shot Jailbreaking in large language models, exploring… Continue reading on InfoSec Write-ups »
Credit Cross-Site Scripting (XSS) is a prevalent security vulnerability that poses a significant threat to web applications worldwide. It involves the injection of malicious scripts into otherw...
https://infosecwriteups.com/xss-unpacked-what-it-is-how-it-works-and-how-to-stop-it-a27f13abe6ed
THE DOCUMENTATIONS I USE IN WEB PENETRATION TESTING I have never talked about my web hacking experience. So I decided to write a series on it. Here I will share how I approach web applications f...
https://infosecwriteups.com/how-i-hack-web-applications-part-1-0833c002cc9a
Learn about Storm Breaker, a social engineering tool with extensive capabilities like accessing webcams, microphones, and more. Includes a… Continue reading on InfoSec Write-ups »
Command Injection Menace: Unraveling PAN-OS’s Critical Flaw Continue reading on InfoSec Write-ups »
https://infosecwriteups.com/cve-2024-3400-a-critical-vulnerability-in-pan-os-firewalls-a7f8c66a10d2
The CISO title should NOT be your end-goal in Cybersecurity Continue reading on InfoSec Write-ups »
https://infosecwriteups.com/if-you-want-to-be-a-ciso-then-read-this-first-036f07ec8d05
Ever wonder how past web data could lead to huge bounties? We will learn how to turn a Wayback machine, into a gold mining machine! Stick around, to learn how to analyze historical data, to get s...
https://infosecwriteups.com/turning-wayback-machine-into-gold-mining-machine-dcca31ee4114