Open in app

Sign In

Write

Sign In

Falken Smaze
Falken Smaze

199 Followers

Home

About

5 days ago

External Network Penetration Testing : The methodology

Join my Discord server for private learning What is External Network Penetration Testing? -> External network penetration testing is the act of auditing an organization’s network security from an external perspective. It involves simulating real-world cyber attacks to identify vulnerabilities and weaknesses that malicious actors could exploit to gain unauthorized access to the network. There are not many CVEs in play!

Pentesting

4 min read

External Network Penetration Testing : The methodology
External Network Penetration Testing : The methodology
Pentesting

4 min read


May 23

Prerequisites for Hackers : What you need to know before getting into hacking!

Join my Discord server for private learning To be proficient in hacking, you need some prerequisite knowledge. This knowledge includes having a basic understanding of : networking, operating systems (Windows & Linux) as well as coding/scripting. (for the most part :)

Hacking

6 min read

Prerequisites  for Hackers : What you need to know before getting into hacking!
Prerequisites  for Hackers : What you need to know before getting into hacking!
Hacking

6 min read


Apr 29

HTTP parameter pollution : Bug bounties [Server-Side ; Client-Side]

Join our Discord server for private learning material and like-minded individuals! What is HTTP parameter pollution? HTTP Parameter Pollution (HPP) involves manipulating the way a website handles parameters received in HTTP requests. This vulnerability arises when an attacker adds extra parameters to a request, and the targeted website considers them trustworthy, resulting in unexpected behavior…

Hpp

5 min read

HTTP parameter pollution : Bug bounties [Server-Side ; Client-Side]
HTTP parameter pollution : Bug bounties [Server-Side ; Client-Side]
Hpp

5 min read


Apr 17

OSiNT Playbook : Sock Puppets

Join our Discord server for private learning material and a like-minded individuals! What’s a sock puppet and why should you have one? In the world of Open Source Intelligence (OSINT) investigations, the use of sock puppets has become a common procedure for both malicious actors and investigators. A sock puppet is a fake online persona created with the intention of…

Osint

3 min read

OSiNT Playbook : Sock Puppets
OSiNT Playbook : Sock Puppets
Osint

3 min read


Apr 16

Discord Community Announcement : Come learn with me (Free course)

Discord is a very well polished messaging platform with a lot of capabilities, one of which is the ability to host your community and bring your followers together, in a server. I am glad to announce that I have put together a Discord server for our community. Click here to…

Hacking

2 min read

Discord Community Announcement : Come learn with me (Free course)
Discord Community Announcement : Come learn with me (Free course)
Hacking

2 min read


Mar 28

The POWER of Shodan : Shodan unrevealed

What is Shodan? Shodan is a search engine like no other. Dubbed the “Google for hackers”, Shodan scans the internet for devices and systems that are connected to the internet, allowing users to see information that would otherwise be hidden. While many people may not have heard of Shodan, it is a powerful…

Shodan

4 min read

The POWER of Shodan : Shodan unrevealed
The POWER of Shodan : Shodan unrevealed
Shodan

4 min read


Feb 8

Hack The Box write-ups : Shoppy

Enumeration portion : NMAP:

Ctf

7 min read

Hack The Box write-ups : Shoppy
Hack The Box write-ups : Shoppy
Ctf

7 min read


Jan 24

Explaining vulnerabilities : IDORs {Bug bounties}

What are IDORs? IDOR (insecure direct object reference) is a broken access control vulnerability The main difference between an classic IDOR vulnerability and a simple BAC vulnerability is that to have an IDOR , we need to have the following conditions met : -> an object identifier exists in the reques (GET or…

Idor

3 min read

Explaining vulnerabilities : IDORs {Bug bounties}
Explaining vulnerabilities : IDORs {Bug bounties}
Idor

3 min read


Jan 21

Red Team Series : Introduction to red teaming

What is red teaming? Red teaming is a concept that has become prevalent in the cyber security industry, yet its meaning and purpose is often misunderstood or distorted. This confusion can stem from a number of factors, including the misappropriation of the term in vendor marketing, and a lack of standardization in compliance requirements…

Red Team

4 min read

Red Team Series : Introduction to red teaming
Red Team Series : Introduction to red teaming
Red Team

4 min read


Jan 9

Open redirects : bug bounties

What are open redirects? Open redirect vulnerabilities occur when websites use HTTP or URL parameters to redirect users to a specified URL without user action. This behavior is often used for convenience, but it can also be exploited by attackers. An open redirect attack occurs when an attacker tricks a user into visiting a…

Open Redirect

7 min read

Open redirects : bug bounties
Open redirects : bug bounties
Open Redirect

7 min read

Falken Smaze

Falken Smaze

199 Followers

15 | hacker | i document my hacking journey

Following
  • Taimur Ijlal

    Taimur Ijlal

  • Xploit Ayush ☠️

    Xploit Ayush ☠️

  • Joshua Speshock

    Joshua Speshock

  • Sleepy

    Sleepy

See all (5)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams