Hack32
@Hack32_
Followers
511
Following
52K
Media
439
Statuses
2K
Cybersecurity Enthusiast | CTFs on HTB | Pentesting Tips | Code and Metal Lover π»π€π€
π
Joined October 2017
Critical vulnerability in CDT FD511GX GPON router: ISP authentication password leak via insecure API. π»ππΎ #EthicalHacking #Linux #CyberSecurity
0
3
8
Here I am testing a tool that requires a license to perform certain functions. "Yes, I'll pay for the license," knowing full well it's Python π They want to make easy money πΎπ #EthicalHacking #Hacking #CyberSecurity
0
1
2
Today we visited a small internet company that's just starting out near where I live π»π€πΎ
0
0
7
I liked this machine, I recommend it πβ οΈ https://t.co/MtLCBzeAa1
#HackTheBox #htb #CyberSecurity #EthicalHacking #InfoSec #PenTesting
labs.hackthebox.com
I have just owned machine Giveback from Hack The Box
1
0
8
Successfully accessed 10 more Russian databases. I'm still dumping the last one so I'll post everything when I'll be done. #Anonymous #OpRussia #RussiaIsATerroristState
49
159
836
I remembered I had an old laptop motherboard with an old processor, so I decided to use it with Slax/Linux Portable. https://t.co/LMS0aw5qin
0
0
0
ππ»πΎ
π οΈ HikvisionExploiter HikvisionExploiter is a powerful and automated exploitation toolkit targeting unauthenticated endpoints on Hikvision IP cameras, particularly those running firmware version 3.1.3.150324. https://t.co/NFb2mlT867
0
0
0
I largely believe that nothing can guarantee online security, but I also believe that ongoing monitoring is essential for responding and gaining an edge over potential attacks.
0
0
1
I installed the MagisTV app and after an internal network audit, I discovered some strange things with the version I installed. #EthicalHacking #CyberSecurity
1
1
3
OSINT is hard! It's not as easy as it seems! It took me 72 hours of intense research and investigation to build a fragment of my exam. Many interconnected chains of results. Outside, transforming raw data into an intelligent report isn't easy! #Cybersecurity #OSINT
6
5
46
Anatomy of a Man-in-the-Middle Attack: How Your Local Network Traffic Is Being Snooped On π»πΎπ #EthicalHacking #Hacking
0
0
4
I'll be doing some testing to find any bugs or vulnerabilities in my Hikvision DVR π»πΎ
0
0
3
I just pwned Hercules on Hack The Box! https://t.co/Sz3q9Mvn3r
#HackTheBox #htb #CyberSecurity #EthicalHacking #InfoSec #PenTesting
labs.hackthebox.com
I have just owned machine Hercules from Hack The Box
3
0
7
Exploitation of CVE-2025β9961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 https://t.co/9UgZe6WLeV
#infosec
2
46
267
And this image is an example of a computer scientist in his natural habitat π»πΎ π€£
0
0
1
Today I was installing a surveillance system; the client requested equipment replacement. π»πΎ
1
0
2
Security Analysis Reveals Critical Flaws at Internet Service Provider: Exposed Keys and Server Data Leaks. #EthicalHacking #Hacking
0
0
4
DeepSearch: The (OSINT) tool that reveals anyone's digital footprint, today I decided to try it and I liked it π»πΎ #EthicalHacking #Hacking
1
0
9