Open in app

Sign In

Write

Sign In

Security Lit Limited
Security Lit Limited

1.1K Followers

Home

About

Pinned

Firewall Evasion Techniques using Nmap

Introduction There are several opportunities to test network penetration. These penetration tests are typically carried out by businesses in order to ascertain whether or not their network and all of the devices that are connected to their internal network are secure and up to date in accordance with the policies that…

Technology

7 min read

Firewall Evasion Techniques using Nmap
Firewall Evasion Techniques using Nmap
Technology

7 min read


4 hours ago

Reconnaissance in Cybersecurity: Unpacking Active and Passive Techniques

In the realm of cybersecurity, reconnaissance plays a critical role. It is an initial phase where information about a target system or network is collected to identify potential vulnerabilities that can be exploited. Reconnaissance does not guarantee a vulnerability, but it facilitates the accumulation of assets and the construction of…

Bug Bounty

5 min read

Reconnaissance in Cybersecurity: Unpacking Active and Passive Techniques
Reconnaissance in Cybersecurity: Unpacking Active and Passive Techniques
Bug Bounty

5 min read


Published in

InfoSec Write-ups

·May 8

Understanding LDAP Injection: Crafting Payloads and Mitigation Strategies

LDAP (Lightweight Directory Access Protocol) is a widely used protocol for accessing and managing directory services. It is often employed for centralized authentication and authorization of users within an organization. However, just like other web technologies, LDAP is susceptible to security vulnerabilities, one of which is LDAP injection. In this…

Bug Bounty

4 min read

Understanding LDAP Injection: Crafting Payloads and Mitigation Strategies
Understanding LDAP Injection: Crafting Payloads and Mitigation Strategies
Bug Bounty

4 min read


Published in

InfoSec Write-ups

·May 6

Understanding Risk, Risk Severity, and Risk Score of a Vulnerability: A Comprehensive Guide

In the realm of cybersecurity, understanding and evaluating the risks associated with vulnerabilities is crucial for effective prioritization and remediation. This blog will explore the concepts of risk, risk severity, and risk score in the context of vulnerabilities, with detailed explanations, technical examples, and analogies to help you grasp these…

Bug Bounty

5 min read

Understanding Risk, Risk Severity, and Risk Score of a Vulnerability: A Comprehensive Guide
Understanding Risk, Risk Severity, and Risk Score of a Vulnerability: A Comprehensive Guide
Bug Bounty

5 min read


Published in

Dev Genius

·May 5

Understanding the Difference Between Vulnerability Assessment and Penetration Testing for Business Owners

As a business owner, you’ve probably heard of vulnerability assessments and penetration testing in the context of cybersecurity. While both of these processes aim to enhance your organization’s security, they are not the same thing. In this blog, we’ll explain the differences between vulnerability assessments and penetration testing, and why…

Penetration Testing

4 min read

Understanding the Difference Between Vulnerability Assessment and Penetration Testing for Business…
Understanding the Difference Between Vulnerability Assessment and Penetration Testing for Business…
Penetration Testing

4 min read


Published in

InfoSec Write-ups

·May 5

A Guide to Identifying and Mitigating Email Header Injection Vulnerabilities for Bug Bounty Hunters

As a bug bounty hunter, one of the vulnerabilities that you should be aware of is email header injection. This vulnerability arises when user input is not properly validated before being sent to an email library, potentially leading to spam or phishing attacks. This blog will discuss how email header…

Cybersecurity

5 min read

A Guide to Identifying and Mitigating Email Header Injection Vulnerabilities for Bug Bounty Hunters
A Guide to Identifying and Mitigating Email Header Injection Vulnerabilities for Bug Bounty Hunters
Cybersecurity

5 min read


Published in

InfoSec Write-ups

·Apr 27

Cybersecurity Fundamentals: Threats, Vulnerabilities, Weaknesses, and Flaws

As a bug bounty hunter, one can start learning penetration testing through observation, which is a largely unstructured way of learning. While we may learn different methods to exploit bugs and become skilled pentesters with practice, we often overlook fundamental cybersecurity terminology such as threat, vulnerability, weakness, and flaw. These…

Bug Bounty

5 min read

Cybersecurity Fundamentals: Threats, Vulnerabilities, Weaknesses, and Flaws
Cybersecurity Fundamentals: Threats, Vulnerabilities, Weaknesses, and Flaws
Bug Bounty

5 min read


Published in

InfoSec Write-ups

·Apr 24

Top 5 Penetration Testing Tools for Bug Bounty

Penetration testing (pentesting) is a type of security assessment that involves simulating an attack on a computer system, network, or web application in order to identify and exploit vulnerabilities. The goal of pentesting is to improve the security of the system by identifying and fixing vulnerabilities before they can be…

Bug Bounty

8 min read

Top 5 Penetration Testing Tools for Bug Bounty
Top 5 Penetration Testing Tools for Bug Bounty
Bug Bounty

8 min read


Published in

Dev Genius

·Apr 18

Hack a Smart Contract: Time Manipulation Attack.

A time manipulation attack is a type of attack that exploits the fact that smart contracts are deterministic. This means that they will always execute the same code in the same way, given the same input. In a time manipulation attack, the attacker tries to trick the smart contract into…

Bug Bounty

7 min read

Hack a Smart Contract: Time Manipulation Attack.
Hack a Smart Contract: Time Manipulation Attack.
Bug Bounty

7 min read


Published in

Dev Genius

·Apr 17

A step-by-step guide to using sqlmap to craft malicious requests:

Using tools like Burp Suite or sqlmap to craft malicious requests that inject code or commands into web apps is a common technique used by attackers to exploit vulnerabilities in web applications. The following steps will explain how to use Burp Suite and sqlmap to inject code or commands into…

Bug Bounty

3 min read

A step-by-step guide to using sqlmap to craft malicious requests:
A step-by-step guide to using sqlmap to craft malicious requests:
Bug Bounty

3 min read

Security Lit Limited

Security Lit Limited

1.1K Followers

https://capturethebug.xyz/signup/

Following
  • Jerry Keszka

    Jerry Keszka

  • Castrofernandezjesus

    Castrofernandezjesus

  • Chris Staudinger

    Chris Staudinger

  • Apoorv Gehlot

    Apoorv Gehlot

  • Nikhil Vemu

    Nikhil Vemu

See all (67)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams