perplexity ai is giving one month free pro usage for students
go and grab this opportunity :))
https://www.perplexity.ai/students
@AfroSec
go and grab this opportunity :))
https://www.perplexity.ai/students
@AfroSec
⚡5🔥2👏1
Forwarded from Tilet solution (Nebyat B Δ)
You don’t have to shine all the time. The moon rests too.
🔥6❤3
Forwarded from INSA Cyber Talent Center
የCTF ውድድር ጥሪ!
የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ)
6ኛው ሀገር አቀፍ የሳይበር ደህንነት ወርን ምክንያት በማድረግ የተዘጋጀ የCapture The Flag (CTF) ውድድር!!
የሳይበር ደህንነት ክህሎትዎን የሚፈትሹበት እና ከሌሎች የዘርፉ ባለሙያዎች ጋር የሚወዳደሩበት መድረክ !!
ይወዳደሩ! ይሸለሙ!
ለመመዝገብ፡- ከታች ያለውን QR ኮድ ስካን ያድርጉ
ቦታ የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ) በአካል
ቀን ጥቅምት 1/2018ዓ.ም
ከ ጠዋቱ 2፡ 30 በአካል
የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ)
6ኛው ሀገር አቀፍ የሳይበር ደህንነት ወርን ምክንያት በማድረግ የተዘጋጀ የCapture The Flag (CTF) ውድድር!!
የሳይበር ደህንነት ክህሎትዎን የሚፈትሹበት እና ከሌሎች የዘርፉ ባለሙያዎች ጋር የሚወዳደሩበት መድረክ !!
ይወዳደሩ! ይሸለሙ!
ለመመዝገብ፡- ከታች ያለውን QR ኮድ ስካን ያድርጉ
ቦታ የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ) በአካል
ቀን ጥቅምት 1/2018ዓ.ም
ከ ጠዋቱ 2፡ 30 በአካል
⚡3👍2🔥1
Forwarded from Brut Security
This media is not supported in your browser
VIEW IN TELEGRAM
How to manually check for CL.TE Request Smuggling Vulnerabilities:
1️⃣ See if a GET request accepts POST
2️⃣ See if it accepts HTTP/1
3️⃣ Disable "Update Content-Length"
4️⃣ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked
0
G
5️⃣ Send request twice.
If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!
Try this out for yourself in our CL.TE lab: https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
1️⃣ See if a GET request accepts POST
2️⃣ See if it accepts HTTP/1
3️⃣ Disable "Update Content-Length"
4️⃣ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked
0
G
5️⃣ Send request twice.
If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!
Try this out for yourself in our CL.TE lab: https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
❤1
Forwarded from Yekolo Temari (የቆሎ ተማሪ)
🎉 The 6th National Cybersecurity Month CTF Has Concluded! 🎉
For those of you who couldn’t make the cut or weren’t able to attend the #CTF in person, good news!
We’ve now made the #CTF publicly accessible for everyone to explore and take on the challenges.
🔗 Click here to register and get started!
Test your skills, learn from real-world scenarios, and see how far you can go.
P.S. The #CTF will be live until tomorrow evening
Let’s see what you’ve got! 💪💻
#CybersecurityMonth #CTF #yekolotemari
For those of you who couldn’t make the cut or weren’t able to attend the #CTF in person, good news!
We’ve now made the #CTF publicly accessible for everyone to explore and take on the challenges.
🔗 Click here to register and get started!
Test your skills, learn from real-world scenarios, and see how far you can go.
P.S. The #CTF will be live until tomorrow evening
Let’s see what you’ve got! 💪💻
#CybersecurityMonth #CTF #yekolotemari
Simulations labs
Cybersecurity Month CTF #2
The CTF will be a Jeopardy Style CTF where every team will have a list of challenges in different categories like Reverse Engineering, Web Security, Digital Forensics, Network Security and others. For every challenge solved, the team will get a certain amount…
⚡1👍1
Forwarded from The Hacker News
Hackers just turned GitHub into their command center.
When police take down their servers, the malware just… reboots itself from GitHub.
The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.
Read how it works → https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
When police take down their servers, the malware just… reboots itself from GitHub.
The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.
Read how it works → https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
🔥4😱3❤1
Forwarded from Yared OG
Ready to Design the Future of Cyber Awareness?
The Cyber Game Jam is back where creativity, coding, and cyber security collide
For 72 hours, innovators will collaborate to design and develop games that make digital safety fun, engaging, and impactful.
👾 Who should join?
🎨 Game Designers
💻 Developers & Programmers
🧠 Storytellers & Writers
🎵 Sound & Visual Artists
🧩 Cyber security Enthusiasts
Whether you’re a pro or a first-timer, this is your chance to learn, create, and compete in a high-energy environment where ideas turn into playable experiences.
📅 Date: October 24–26, 2025
🕒 Duration: 48 Hours | 2 Days
📍 Place: Information Network Security Agency (INSA) Headquarters , Addis Ababa
Brought to you by Information Network Security Agency (INSA) in collaboration with Efuye Gela.
The Cyber Game Jam is back where creativity, coding, and cyber security collide
For 72 hours, innovators will collaborate to design and develop games that make digital safety fun, engaging, and impactful.
👾 Who should join?
🎨 Game Designers
💻 Developers & Programmers
🧠 Storytellers & Writers
🎵 Sound & Visual Artists
🧩 Cyber security Enthusiasts
Whether you’re a pro or a first-timer, this is your chance to learn, create, and compete in a high-energy environment where ideas turn into playable experiences.
📅 Date: October 24–26, 2025
🕒 Duration: 48 Hours | 2 Days
📍 Place: Information Network Security Agency (INSA) Headquarters , Addis Ababa
Brought to you by Information Network Security Agency (INSA) in collaboration with Efuye Gela.
🔥2⚡1