BE-Hacktive
HackTricksTwitterLinkedInSponsorWebsite
English
English
  • BE-Hacktive
  • About the author and the project
  • Table of contents
  • Contact
  • 🎬Synopsis
    • Technology over time
    • Cybersecurity
    • CVE
  • 🏆Eskooly - CVE
    • ESKOOLY
    • CVE-2024-27709 - SQL Injection in Eskooly Web Product v.3.0
    • ESkooly - Broken Authentication
      • CVE-2024-27710 - Privilege Escalation via Authentication Mechanism in Eskooly Web Product <= v3.0
      • CVE-2024-27711 - User Enumeration via Sign-up Process in Eskooly Web Product <= v3.0
      • CVE-2024-27712 - User Enumeration via Account Settings in Eskooly Web Product <= v3.0
    • CVE-2024-27713 - Protection mechanism Failure in Eskooly Web Product <= v3.0
    • CVE-2024-27715 - Inadequate Password Update Verification in Eskooly Web Product <= v3.0
    • CVE-2024-27716 - Cross-site Scripting (XSS) in Eskooly Web Product <= v3.0
    • CVE-2024-27717 - Cross-Site Request Forgery (CSRF) in Eskooly Web Product <= v3.0
  • 🚨Tip 1 - Raising awareness
    • Phishing
      • Phishing - Origins
      • Phishing - Evolution
      • Phishing - Statistics
      • Phishing - Techniques
      • Phishing - Protection
    • Malware
      • Malware - Origines
      • Malware - Evolution
      • Malware - Categories
      • Malware - Ransomware
    • Passwords
      • Passwords - Origins
      • Passwords - Evolution of authentication
      • Passwords - Statistics
      • Passwords - Protect yourself
  • 🧨Capsule 2 - Ethical Hacking
    • Definition and Methodology
  • 🧰Capsule 3 - Tools
    • Burp Suite
      • Installation
      • Intercept HTTP traffic with Burp Proxy
      • Define the perimeter
      • Intruder et Repeater
  • Capsule 2 - Ethical Hacking
    • Page 1
  • 📖Articles
    • Cybersecurity 2023: 5 major threats and how to protect yourself from them
    • Am I a victim of data leaks?
    • LOG4J: The vulnerable bookstore that is shaking the planet
    • LOG4SHELL: COME, SEE, LIVE
    • Protecting Your Child Online: Tips for Safer Internet Day
    • ChatGPT: Revolution or threat?
    • The FBI dismantles Raptor Train: A Chinese Botnet that Infected 260,000 IoT Devices Worldwide!
  • 🗞️News
    • Active exploitation of TP-Link, Apache and Oracle vulnerabilities detected
    • Microsoft stresses the urgency of patching Exchange servers locally
Powered by GitBook
On this page
  • Synopsis
  • Capsules
  • Tip 1 - Raising awareness
  • Articles
  • News

Table of contents

The blog topics are listed below.

Synopsis

Title
Description

The evolution of technology over time leads to the question of cybersecurity.

Definitions of cybersecurity and cybercrime terms.

Capsules

Tip 1 - Raising awareness

Title
Description

Definition, origin, evolution, techniques and protection. All about phishing

Definition, origin, evolution, categories and RANSOMWARE are covered in this section.

Definition, evolution, statistics and protection

Articles

Titre
Description

Check whether your data is on the Internet and what to do about it.

Definition and explanation of Log4j issues.

Understand, detect and exploit Log4shell.

Urgent warning from Microsoft about the importance of updates for Exchange servers.

News

Title
Description

Microsoft today urged its customers to keep their “on-premises Exchange servers” patched with the latest supported cumulative update (CU), so that they are always ready to deploy an emergency security update.

PreviousAbout the author and the projectNextContact

Last updated 5 months ago

Technology over time
Cybersecurity
Phishing
Malware
Passowrds
Am I a victim of data leakage?
LOG4J: The vulnerable bookshop that's shaking up the world
LOG4SHELL: VENI,VIDI,VICI
Microsoft insists on the urgency of patching local Exchange servers
Microsoft insists on the urgency of patching local Exchange servers