Skip links

Blog

Learn more about cyber security

WEB HACKING AND SECURITY
Youssef

Directory Brute-Forcing: Uncovering Hidden Files

Directory brute-forcing, also known as a directory brute force attack, is a powerful technique to discover hidden files on a web server. By systematically testing directory and file names with directory brute forcing tools like DirBuster Kali, Gobuster commands, or WFuzz directory brute forcing, attackers and pentesters can

Read More »
WEB HACKING AND SECURITY
Youssef

Bruteforce de Répertoires : Découvrir les Fichiers Cachés

Le bruteforce de répertoires, ou attaque par force brute répertoires, est une technique puissante pour découvrir fichiers cachés sur un serveur web. En testant systématiquement des noms de répertoires et de fichiers à l’aide d’outils bruteforce répertoires comme DirBuster Kali, Gobuster utilisation, ou WFuzz scan répertoires, les attaquants

Read More »
Remote Code Execution RCE Attack
WEB HACKING AND SECURITY
Youssef

RCE Attacks: When Hackers Take Total Control

RCE attacks, or Remote Code Execution, are among the most severe threats in cybersecurity. By exploiting a RCE vulnerability, a hacker can run malicious code on a remote system, gaining complete control. These attacks come in many forms: RCE via injection in web applications, RCE

Read More »
Remote Code Execution RCE Attack
WEB HACKING AND SECURITY
Youssef

Attaques RCE : Quand les Hackers Prennent le Contrôle Total

Les attaques RCE, ou Remote Code Execution (exécution de code à distance), figurent parmi les menaces les plus graves en cybersécurité. En exploitant une vulnérabilité RCE, un pirate peut exécuter des commandes ou des scripts malveillants sur un serveur ou un dispositif distant, prenant

Read More »

From User to Admin: Privilege Escalation Techniques

Moving from a regular user to an admin on a web application, or web privilege escalation, is a prime goal for attackers and security testers alike. Whether through SQL injection for privileges, authentication bypass, or admin cookie modification, these techniques exploit common vulnerabilities to

Read More »

Clickjacking: The Silent UI Exploit You Can’t Ignore

Clickjacking, also known as UI redressing, is a sneaky threat that exploits users’ trust in web interfaces. Listed under clickjacking OWASP A5 (Broken Access Control), this attack leverages techniques like iframe exploitation techniques and invisible overlay attacks to trick users into performing unintended actions. Whether it’s for clickjacking

Read More »
This website uses cookies to improve your web experience.
FrançaisfrFrançaisFrançais
0