#Ethicalhacking

2026-02-11

Hack smarter, defend stronger. Catch the newest daily videos curated for security pros and learners. 🎯 youtube.com/playlist?list=PLXq
#CyberSecurity #ThreatIntelligence #EthicalHacking #DataSecurity #DarkWeb

Wen Bin :verified:kongwenbin@infosec.exchange
2026-02-10

New HTB walkthrough: REDEEMER (Tier 0) - Redis fundamentals for beginners.

Redis is everywhere! Caching, session stores, job queues – and when it is exposed or misconfigured, it can leak sensitive data. I just published a beginner-focused walkthrough that covers:

πŸ”Ή How sensitive data can be stored directly in memory
πŸ”Ή What Redis is and common use cases
πŸ”Ή Why you shouldn't expose Redis without authentication
πŸ”Ή How to identify Redis with Nmap (port 6379)
πŸ”Ή How to connect with "redis-cli", enumerate keys and databases
πŸ”Ή Why "KEYS *" is fine for CTFs but use "SCAN" in production

This is part of my ongoing Hack The Box Starting Point – Step-by-Step Walkthrough for Beginners series, where the goal is to help newcomers build strong fundamentals in ethical hacking.

πŸŽ₯ Watch the HTB Redeemer walkthrough here:

β–Ά youtube.com/watch?v=81JN1vy1HGY

πŸ“‚ Full playlist:

β–Ά youtube.com/playlist?list=PL2m

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically πŸ”

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #redis

Rad Web Hostingradwebhosting
2026-02-09

Comprehensive List of Top 10 Uses for Servers If you've ever wondered, "what are common use-cases for VPS servers?", you have come to the right place!

We have compiled a list of the top 10 uses for VPS servers, as observed by Rad Web Hosting staff, during the course of providing VPS hosting services since 2015.

It should be noted that this compilation is not ...
Continued πŸ‘‰ blog.radwebhosting.com/top-10-

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. πŸ‘‰ youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. πŸ‘‰ youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. πŸ‘‰ youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New playlist online: from malware analysis to ethical hacking demos. Check it out here πŸ‘‰ youtube.com/playlist?list=PLXq
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse

New playlist online: from malware analysis to ethical hacking demos. Check it out here πŸ‘‰ youtube.com/playlist?list=PLXq
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse

New playlist online: from malware analysis to ethical hacking demos. Check it out here πŸ‘‰ youtube.com/playlist?list=PLXq
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse

Latest cyber & hacking videos compiled for you twice a day. Watch now & stay ahead of threats. πŸ”’ youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #CloudSecurity #Phishing #EthicalHacking

2026-02-04

🚨 Active exploitation confirmed: CVE-2026-24061.

This isn't just theoretical, it's a massive exposure. With nearly 800,000 Telnet instances exposed globally across legacy IoT and outdated servers, the risk of a root-level compromise is real and immediate.

We have updated Pentest-Tools.com to help you validate your exposure:

πŸ“‘ Network Scanner - detects exposed Telnet services across your internal and external perimeters, identifying potentially vulnerable GNU Inetutils daemons.

🎯 Sniper Auto-Exploiter - safely executes a proof-of-concept to confirm if the authentication bypass is actually exploitable on your systems, providing the evidence needed to prioritize an immediate fix.

⚠️ Crucial detail: This critical vulnerability exists because telnetd fails to sanitize the USER environment variable. An attacker can simply supply -f root to bypass the login prompt entirely and gain instant, unauthenticated root shell access.

Attacks are happening in real-time. Validate your risk before it becomes a root-level compromise.

#offensivesecurity #ethicalhacking #infosec #cybersecurity

Check out more details about this critical vulnerability: pentest-tools.com/vulnerabilit

Detect with Network Scanner: pentest-tools.com/network-vuln

Validate with Sniper Auto-Exploiter: pentest-tools.com/exploit-help

CVE-2026-24061 - Network ScannerCVE-2026-24061 - Sniper Auto-ExploiterCVE-2026-24061
2026-02-03

January was all about detection depth and clarity.

Here we go with the most important updates in Pentest-Tools.com:

πŸ•·οΈ Deeper logic - the Website Scanner now hunts down CL.0 request smuggling and serialized objects inside JSON payloads.

🎯 Validate your exposure - you know the risks of React2Shell and FortiWeb. Now use Sniper: Auto-Exploiter to prove your patches actually hold up against real exploits.

βš“ Port-aware findings - we now group findings by port. Same vulnerability, different port? That is now a separate entry for cleaner reporting.

See the full breakdown on January updates here: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

#Infosec #EthicalHacking #OffensiveSecurity

Wen Bin :verified:kongwenbin@infosec.exchange
2026-02-03

πŸ’‘ Understanding core network protocols is fundamental for any aspiring cyber security professional. One of the most common that you will encounter is SMB (Server Message Block).

In my latest video, I provide a detailed, beginner friendly walkthrough of the "DANCING" machine from Hack The Box, focusing entirely on SMB enumeration and access πŸš€

You will learn:
πŸ”Ή What SMB (Server Message Block) is and how it works
πŸ”Ή Common SMB ports (139 & 445) and why they matter
πŸ”Ή How to use Nmap for targeted service enumeration such as SMB services
πŸ”Ή How to enumerate SMB shares using smbclient
πŸ”Ή Understanding anonymous / misconfigured shares
πŸ”Ή Downloading files from SMB shares and capturing the flag

This is a perfect starting point for anyone new to ethical hacking.

πŸŽ₯ Watch the HTB DANCING walkthrough here:

youtube.com/watch?v=CpaBWeq9JU8

πŸ“‚ Full playlist:

youtube.com/playlist?list=PL2m

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically πŸ”

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #SMB

Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-02-02
πŸ΄β€β˜ οΈ El Curso Fundamentos de Hacking Γ‰tico estΓ‘ permanente disponible en el aula virtual para acceso inmediato. πŸ“² WhatsApp: https://wa.me/51949304030 πŸ’» https://www.reydes.com/e/Curso_Fundamentos_de_Hacking_Etico #cybersecurity #ethicalhacking #infosec #bugbounty #hacking

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. πŸ‘‰ youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst