this is writup for RootMe CTF from tryhackme
we start by scanning the target ip addrr by nmap
we can see that we have 2 open port 80-http and 20-ssh
next we have to find What version of Apache is ...
Recently, an Authorization Bypass vulnerability was discovered in the Next.js framework (one of the most popular today) and was cataloged as CVE-2025-29927 and received a CVSS score of 9.1 (which is v...
In the ever-evolving field of cybersecurity, the use of Artificial Intelligence (AI) has changed the manner in which organizations secure themselves from cyber attacks. AI plays a critical role in the...
In this detailed article, we will dive deeper into the concepts of Cross-Site Scripting (XSS) and SQL Injection vulnerabilities. We will explain their workflows, demonstrate practical examples, provid...
Really experimental, but I noticed some Next.js deployments expose a buildManifest file that links every available route to its corresponding CSS and JS assets.As an experiment, I went a bit further a...
Hi there! 👋Welcome to my very first blog post! I'm a developer with about six months of hands-on experience in building web applications, and through this journey, I’ve realized how crucial secur...
In the world of cybersecurity, understanding how data travels across networks is crucial. This is where packet sniffing comes into play. Packet sniffing is a powerful technique used to monitor and ana...
Baiting is a deceptive tactic used by cybercriminals to lure unsuspecting victims into compromising their own security. It's a common form of social engineering that plays on human curiosity or greed,...
In today's digital age, understanding network attacks is crucial for anyone using the internet. A network attack is any unauthorized action that targets or exploits the network resources, often leadin...
In the world of cybersecurity, hacking is a term that often conjures up images of criminal activity and illicit behavior. However, not all hackers fit neatly into the categories of "good" or "bad." Am...