RatSec

RatSec Blog

Useful websites for hackers

- Posted in Uncategorized by

List of websites that can be useful resources for ethical hackers, bug bounty hunters, and penetration testers. hackxpert labs - Practise labs for ethical hacking. Bugcrowd - Another popular bug
A Quick Guide on the OSI Layers Physical Layer (Layer 1): Deals with the physical connection between devices. Defines characteristics like voltage levels, data rates, and physical connectors. Ensures

Top 15 tools related to DNS

- Posted in Bug bounties by

A list of various DNS (Domain Name System) tools that serve different purposes: nslookup: A command-line tool available on most operating systems for querying DNS to obtain domain name or IP address
Network Address Translation (NAT) is a technique used in computer networking to allow multiple devices on a local network to share a single public IP address. It operates at the network layer of the
The top 20 network exploiting techniques: Port Scanning: This is the process of scanning a network to find open ports. Banner Grabbing: This technique is used to gather information about a computer

Top web exploits 2023

- Posted in Uncategorized by

top web exploits 2023 JsonWebToken (CVE-2022-23529). ChatGPT (CVE-2023-28858). Apache Superset (CVE-2023-27524). PaperCut NG/MF (CVE-2023-27350). Fortinet FortiOS (CVE-2022-41328). Adobe ColdFusion
The OWASP API Top 10 is a powerful awareness document for web application security that represents a broad consensus about the most critical security risks to web APIs. Here are 10 pieces of
Teaching JavaScript to bug bounty hunters involves focusing on parts of the language and its ecosystem that are commonly associated with security vulnerabilities. Here are 10 examples of JavaScript