sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

597
active users

#ethicalhacking

0 posts0 participants0 posts today

github.com/brotheralameen1/Dis

Published Security Advisory for OneTrust SDK V6.33.0 Vulnerable to Prototype Pollution causing DoS in the system by editing Prototype Value. Currently, submitted this to MITRE CVE to request publication of my CVE to the National Vulnerability Database and awaiting their response. You can click the link above to learn more about the exploit.

🔥 SCATTANO LE PROMO PER IL CORSO "DARK WEB E CYBER THREAT INTELLIGENCE" IN PARTENZA IL 15 GIUGNO. ULTIMI 4 POSTI DISPONIBILI

📌30% DI SCONTO SE HAI GIÀ ACQUISTATO UN CORSO E-LEARNING IN ACADEMY
📌30% DI SCONTO SE HAI ACQUISTATO TUTTI E TRE I FUMETTI DI BETTI-RHC NEI MESI PRECEDENTI
📌20% DI SCONTO SE PORTI UN AMICO AL CORSO CON TE
📌15% DI SCONTO SE SEI UNO STUDENTE
📌10% DI SCONTO SE CONDIVIDI IL CORSO SUI TUOI CANALI SOCIAL RIPORTANDO IL LINK ACADEMY.REDHOTCYBER.COM

Sei ancora indeciso? E' ora di prendere una decisione, i posti stanno terminando!
📝Contattaci subito su WhatsApp al 379 163 8765 o scrivi ad academy@redhotcyber.com

Thinking of taking #Meshtastic to a #Protest ? #WiFi and #Bluetooth can be used
to track you, which makes bringing a smartphone a bad idea. Here's how to use
Meshtastic while leaving your phone at home. #privacy #offgrid #LoRa
#ethicalhacking #Electronics #hacking

#Privacy friendly link:
- inv.nadeko.net/watch?v=n6jVrH4

for more info: check alt.2600.madrid and hispagatos.talk in #USENET

also in #matrix #meshtastic-community:matrix.org

Happy Hacking
ReK2

Wireless Penetration Testing Tools You Should Know 📡🔐

Wireless networks can be a critical attack surface if not properly secured. These tools are widely used in authorized lab environments to assess the strength of Wi-Fi configurations and encryption protocols.

Use cases include:
• Testing weak encryption (WEP/WPA)
• Detecting rogue access points
• Capturing and analyzing authentication handshakes
• Teaching wireless attack vectors in controlled labs

Disclaimer: This content is for educational and ethical use only. Wireless testing must only be performed on networks you own or have explicit authorization to audit.

24 Essential Penetration Testing Tools Every Ethical Hacker Should Know 🛠️🔍

Whether you're just starting out or building a full red team toolkit, these tools cover all the key stages of a penetration test — from recon to reporting.

📋 5 Infographics:

🧭 Reconnaissance & Info Gathering
💣 Exploitation & Post-Exploitation
🔐 Credential Attacks & Wireless Testing
🌐 Web App Testing & Shells
🧪 Vulnerability Scanning & Enumeration
🔍 Reverse Engineering & Analysis

Disclaimer: This content is intended for educational and ethical use only. Always perform testing in lab environments or with explicit permission.

🐈‍⬛ Hashcat – A Practical Guide to Password Auditing

Hashcat is a powerful GPU-accelerated password recovery tool used by security professionals to test the strength of passwords in authorized environments.

🧠 What Hashcat is used for:
• Auditing password hashes (e.g., from Windows, Linux, web apps)
• Testing password policies and complexity
• Identifying weak or reused credentials in simulated lab setups

🔐 Key Features:
• Supports a wide variety of hash types (MD5, SHA1, NTLM, bcrypt, etc.)
• Multiple attack modes: dictionary, brute-force, mask, hybrid, rule-based
• Highly customizable and efficient with GPU acceleration
• Works well for red teamers and defenders validating password hygiene

🎯 When to use it:
• During penetration tests (with permission)
• In password policy assessments
• For internal security audits and training exercises

Disclaimer: This guide is for educational and ethical use only. Only audit password hashes on systems you own or have explicit authorization to test.

Metasploit Basics: Your First Stop in Ethical Exploitation 🚂💻🛡️

The Metasploit Framework is a powerful tool used by ethical hackers and penetration testers to identify and validate security vulnerabilities — all within authorized lab environments.

🧠 What you'll learn as a beginner:
• Launching msfconsole and navigating modules
• Using search, use, and show options commands
• Exploiting known vulnerabilities (e.g., MS08-067) in test environments
• Understanding payloads, listeners, and sessions
• Basics of Meterpreter for post-exploitation testing

🎯 Ideal for cybersecurity learners, OSCP candidates, and red teamers building foundational skills — ethically and safely.

Disclaimer: This content is intended for educational and ethical use only. Use Metasploit only in lab environments or with explicit permission.