PWNKIT The Qualys Research Team has discovered a memory corruption vulnerability in polkit’s pkexec, a SUID-root program that is installed…
Katana: An Overview of the Powerful Web Application Security Scanner [Cheat Sheet]
Features of Katana Katana offers a range of features that make it an effective web application security scanner. Some of its…
Understanding Linux Privilege Escalation: Gaining Root Access
What is Privilege Escalation? Privilege escalation refers to the process of acquiring higher-level permissions or privileges than originally intended or…
Understanding Subdomain Takeover: Risks and Mitigation
What is Subdomain Takeover? Subdomain takeover is a security threat that arises when an organization neglects to maintain or properly…
Subdomain Enumeration 2024 —
Here are some widely used methods and tools for subdomain enumeration 1. Brute Force Techniques: 2. Search Engines and Services:…
Exploring Curl, Wget, and HTTPX Commands for Efficient Web Interactions
In the realm of command-line utilities for web interactions, tools like curl, wget, and httpx play pivotal roles, enabling users…
Understanding Linux Bash Commands and Practical Examples #~
Introduction Linux commands, specifically those utilized in the Bash shell, empower users to interact with their systems efficiently and perform…