RatSec

RatSec Blog

Uncategorized

Topics that don't need a category, or don't fit into any other existing category.

Bug Bounty Cheat Sheet

- Posted in Uncategorized by

Information Gathering - Identify target IP addresses and domains. - Perform DNS enumeration. - Identify technologies used by the target (e.g., Wappalyzer). - Identify people related to the target

JWT for Beginners

- Posted in Uncategorized by

JWT for Beginners 1. JWT Overview: JSON Web Tokens (JWTs) are a compact, URL-safe means of representing claims between two parties. JWTs are often used for authentication, information exchange, and

Useful websites for hackers

- Posted in Uncategorized by

List of websites that can be useful resources for ethical hackers, bug bounty hunters, and penetration testers. hackxpert labs - Practise labs for ethical hacking. Bugcrowd - Another popular bug
A Quick Guide on the OSI Layers Physical Layer (Layer 1): Deals with the physical connection between devices. Defines characteristics like voltage levels, data rates, and physical connectors. Ensures
Network Address Translation (NAT) is a technique used in computer networking to allow multiple devices on a local network to share a single public IP address. It operates at the network layer of the
The top 20 network exploiting techniques: Port Scanning: This is the process of scanning a network to find open ports. Banner Grabbing: This technique is used to gather information about a computer

Top web exploits 2023

- Posted in Uncategorized by

top web exploits 2023 JsonWebToken (CVE-2022-23529). ChatGPT (CVE-2023-28858). Apache Superset (CVE-2023-27524). PaperCut NG/MF (CVE-2023-27350). Fortinet FortiOS (CVE-2022-41328). Adobe ColdFusion

SSRF Vulnerability

- Posted in Uncategorized by

This PHP code defines a simple web page that is vulnerable to Server-Side Request Forgery (SSRF). Let's break down the code: PHP Configuration: ini_set('allow_url_fopen', '1'); This line sets the
Getting started in the field of cybersecurity involves a combination of education, hands-on experience, and staying updated on the latest developments. Here's a list of top things you can do to
As a developer focusing on cybersecurity and coding, your role is crucial in creating secure and robust software systems. Here are some key aspects you should consider: Secure Coding Practices: