April 26, 2024, 11:10 a.m. | Gagan Yalamuri

System Weakness - Medium systemweakness.com

Introduction

In the intricate world of cybersecurity, knowledge is power, and reconnaissance is the key to unlocking it. By peering into the hidden corners of digital landscapes, security professionals can uncover vulnerabilities before they’re exploited. This article embarks on a journey through advanced reconnaissance techniques, armed with powerful tools to expose hidden risks and fortify web security.

HTTPX: Decrypting SSL Secrets

Example usage of httpX

Imagine having a magnifying glass to scrutinize a website’s SSL certificate, revealing its security secrets. …

bug bounty computer science cybersecurity ethical hacking information security

Head of Security Operations

@ Canonical Ltd. | Home based - Americas, EMEA

Security Specialist

@ Lely | Maassluis, Netherlands

Senior Cyber Incident Response (Hybrid)

@ SmartDev | Cầu Giấy, Vietnam

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom