#ethicalhacking

Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-03-16
🦜 El Curso de Hacking Ético está disponible de manera permanente en el aula virtual con acceso inmediato. 📱 WhatsApp: https://wa.me/51949304030 🌎 https://www.reydes.com/archivos/cursos/Curso_Hacking_Etico.pdf #ethicalhacking #cybersecurity #infosec #penetrationtesting #pentesting #whitehat #hacking
2026-03-16

Voll der feine, inspirierende Samstag beim C3WTF: Da war die erste FLINTA-Edition unseres C3WTF* (Chaos Computer Club Wien + Capture the Flag) und ich bin immer noch ganz happy über die Energie im Raum!
Gemeinsam mit @totientfunction durfte ich das Event hosten, es war großartig zu sehen, wie viele motivierte FLINTA* zusammengekommen sind, um Sicherheitslücken auf Webseiten aufzuspüren (ethisches Hacken) oder die Kommandozeile spielerisch zu erarbeiten

Besonders schön war der gegenseitige Support. Egal ob Profi oder absolute Anfänger*in, Themen wurde erklärt, sich gegenseitig Tipps gegeben und gemeinsam um die Ecke gedacht. Genau so macht Technik Spaß!

Du hast es verpasst? Wir machen weiter, hier die nächsten Termine:

Samstag 11. April ab 14:45: Nächste FLINTA*-Edition (Favoritenstraße 11, 1040 Wien)

Samstag 21. März ab 14 Uhr: Open for all genders @ Metalab.at

Freitag 8. Mai 15:45: Open for all genders @ TU Wien

metalab.at/wiki/Haecksen#C3WTF

Wer neugierig geworden ist: In unserem Pad findet ihr alle Ressourcen und Links vom letzten Mal zum Nachlesen: pads.c3w.at/code/#/2/code/view

Danke an alle, die da waren und es war super. Wir sehen uns beim nächsten Rätsellösen! 🕵️‍♀️💻

#C3WTF #CyberSecurity #FLINTA #EthicalHacking #FrauenInDerIT #WienTech #CommunityLearning #C3W #CTF #C3W #Vienna #Wien #IT #DIY @c3wien @haecksen

Vorlesungssaal mit vielen Sesseln. Text: "Cybersecurity challenges gemeinsam lösen, yay! Vibes!"

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

OdicforceSoundsTaoExpression
2026-03-14

Latest cyber & hacking videos compiled for you twice a day. Watch now & stay ahead of threats. 🔒 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #CloudSecurity #Phishing #EthicalHacking

Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-03-13
🥷 Mañana sábado 14 de marzo damos inicio al Curso Fundamentos de Hacking Ético 2026. ➡️ Sábados 14 y 21 de marzo. De 9 am a 12 pm (UTC -05:00). 📲 WhatsApp: https://wa.me/51949304030 🌐 https://www.reydes.com/archivos/cursos/Curso_Fundamentos_Hacking_Etico.pdf #ethicalhacking #cybersecurity #infosec #penetrationtesting #whitehat #dataprotection #cyberattack
Curso Fundamentos de Hacking Ético 2026Curso Fundamentos de Hacking Ético 2026
2026-03-13

You found the CVE.

Now comes the annoying part: figuring out what it actually means.

Not the score.

Not the headline.

The real part - how it behaves, how to validate it, and how to explain it without opening 12 tabs.

That’s why we built the Pentest-Tools.com "Vulnerabilities & exploits database".

It gives you:

📖 Context - what the flaw does and how it behaves

🛠️ Practical remediation - not just generic patch advice

🔗 Validation paths - direct links to the tools that help confirm exposure

📝 Cleaner reporting - less tab-switching, more time for actual testing

Thousands of vulnerabilities, built for practitioners who need answers fast.

Access the full library here: pentest-tools.com/vulnerabilit

#infosec #vulnerabilitymanagement #ethicalhacking #cybersecurity

Vulnerabilities database - Pentest-Tools.com
Wen Bin :verified:kongwenbin@infosec.exchange
2026-03-13

👋 Here's a quick infographic that sums up my Hack The Box - Redeemer walkthrough (Redis enumeration).

👉 Watch the full step-by-step video: youtu.be/81JN1vy1HGY

#HackTheBox #Redis #EthicalHacking #CyberSecurity #PenTesting #CTF #Infosec #htb

An infographic for solving the Hack the box machine called Redeemer
Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-03-12
🏗️ ¿Eres profesional de TI y quieres dar el salto hacia la Cibereguridad? 🔀 Este curso es tu puente hacia el mundo del Hacking Ético. Metodologías ágiles y prácticas te esperan. ✨ 30% de Descuento 🎟️ Sábados 14 y 21 de marzo. De 9 am a 12 pm (UTC -05:00). 📲 WhatsApp: https://wa.me/51949304030 🌎 https://www.reydes.com/archivos/cursos/Curso_Fundamentos_Hacking_Etico.pdf #ethicalhacking #cybersecurity #infosec #hacking #penetrationtesting #whitehat #cyberattack
Anastasis VasileiadisCyberkid1987@defcon.social
2026-03-11

🚨 Your Android Phone Can Turn Into a Cybersecurity Lab… 📱🐉

Most people think penetration testing requires a powerful computer.
But tools like ANDRAX-NG are changing that.

The new ANDRAX-NG v1002 pre-stable update brings improvements that turn your Android device into a portable security testing environment.

⚡ In this reel you’ll see:

📱 A mobile pentesting platform running on Android
⚔️ Powerful cybersecurity tools in your pocket
🚀 A preview of the new ANDRAX-NG update

Your smartphone can become a portable hacking lab for learning cybersecurity.

⚠️ Demonstration for educational and authorized security research only.

👉 Don’t comment yet
🔁 Share this reel first to support my work
💬 Then comment ANDRAX and tell me what you want to see next

#CyberSecurity #EthicalHacking #AndroidSecurity #Pentesting #Infosec

Hack smarter, defend stronger. Catch the newest daily videos curated for security pros and learners. 🎯 youtube.com/playlist?list=PLXq
#CyberSecurity #ThreatIntelligence #EthicalHacking #DataSecurity #DarkWeb

Anastasis VasileiadisCyberkid1987@defcon.social
2026-03-10

🔎 Cybersecurity Challenge #6 – Spot the Vulnerability

This application fetches an image from a URL provided by the user. Sounds harmless, right? 👨‍💻

But allowing servers to request external resources based on user input can sometimes open the door to dangerous attacks.

Take a closer look at how the URL is validated and how the request is made.

⚠️ Is the validation strong enough?

Question: What security vulnerability exists in this code?

A) SQL Injection
B) Server-Side Request Forgery (SSRF)
C) External XML Entity (XXE)
D) URL Redirection

💬 Comment your answer and tell us which line reveals the vulnerability!

In the next post, I’ll reveal the correct answer and explain how attackers could exploit it in real-world environments.

#cybersecurity #infosec #ethicalhacking #websecurity #bugbounty #securecoding #CyberKid #securitychallenge #SSRF

Anastasis VasileiadisCyberkid1987@defcon.social
2026-03-10

🚨 Your Wi-Fi Network Reveals More Than You Think… 📡

Most people have no idea how many devices are connected to their network — or how easy it is to analyze a Wi-Fi environment using cybersecurity tools.

In this reel I demonstrate HighDacker, a powerful Android cybersecurity application used for wireless network analysis and security testing.

⚡ What you’ll see in the demo:
📡 Discover nearby Wi-Fi access points
📱 Identify devices connected to the network
🔎 Test network configurations using security auditing tools
🛡 Understand how devices can be managed or restricted inside a network

This is exactly why Wi-Fi security configuration matters more than most people realize.

⚠️ Demonstration performed for educational cybersecurity awareness only.

👉 Don’t comment yet
🔁 Share this reel first to support my work
💬 Then comment HACKER and tell me what you want to see next

#CyberSecurity #WiFiSecurity #EthicalHacking #Infosec #NetworkSecurity

Rad Web Hostingradwebhosting
2026-03-10

Comprehensive List of Top 10 Uses for Servers If you've ever wondered, "what are common use-cases for VPS servers?", you have come to the right place!

We have compiled a list of the top 10 uses for VPS servers, as observed by Rad Web Hosting staff, during the course of providing VPS hosting services since 2015.

It should be noted that this compilation is not ...
Continued 👉 blog.radwebhosting.com/top-10-

iShowCybersecurity🛡️ishowcybersecurity
2026-03-09

Why Cracked Software Is Dangerous ?

Using cracked or pirated software can install malware and compromise your system security.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst