ArcNET
1.49K subscribers
65 photos
66 links
Tech news, tips, guides, and community updates, all in one place.

Join our community
https://t.me/arcnet_am_community
Download Telegram
Channel name was changed to «ArcNET»
ARPANET. Ինտերնետի ԴՆԹ-ն և Ցանցային էվոլյուցիան, առաջին համակարգչային վիրուս։

ARPANET-ը փոխեց տվյալների փոխանցումը՝ ներդնելով packet switching, որը ապահովում էր կայուն կապ նույնիսկ խափանումների դեպքում։ Սառը պատերազմի պայմաններում սա կարևոր առաջընթաց էր։ Հետագայում Vint Cerf-ը և Robert Kahn-ը ստեղծեցին TCP/IP-ն, որը դարձավ ինտերնետի հիմքը։
Սակայն անվտանգությունը սկզբում անտեսվեց, ինչի հետևանքով առաջացան տարբեր խոցելիություններ։

https://arcnet.am/post/22

#web_security #hacking
23
Shadows Don't Lie: Why Metadata Died and Chronolocation Became OSINT's Only Religion

An exploration of how traditional metadata lost its reliability and why chronolocation has emerged as a critical method in modern OSINT investigations.

https://arcnet.am/post/9

#chronolocation #metadata #osint
2🔥2
GraphQL Hacking: Queries, and Batching Attacks ( web2 focus )

Comprehensive guide to GraphQL API hacking in Web2 applications. Learn endpoint discovery, query vulnerabilities, and essential testing tools for bug bounty hunting.

https://arcnet.am/post/12

#graphql #hacking #attacks
2🔥2
Why Web2 Still Owns Web3 (And Always Will)

Why Web2 outperforms Web3 in security, UX, and architecture. A technical breakdown of why decentralization isn't replacing reliability.

https://arcnet.am/post/2

#bug_hunt #web2 #cybersecurity
42
Nmap: From Basic Discovery to Advanced Penetration Testing

A complete technical reference on Nmap for network discovery, attack surface enumeration, and penetration testing. Covers core concepts, essential commands, port states, scan types

https://arcnet.am/post/4

#nmap #pentest
3🔥2
Offensive Hacking Handbook: Subdomains, SQLi, IDORs & Hash Cracking

Systematic subdomain enumeration using certificate transparency, bruteforcing, JavaScript analysis, and OSINT methodologies

https://arcnet.am/post/5

#sqli #idors #hash_cracking #subdomains
32
Linux Fundamentals: Structure, Commands, and Core Concepts

Learn the fundamentals of Linux including filesystem structure, basic commands, networking tools, SSH access, and system management essential for beginners and cybersecurity professionals.

https://arcnet.am/post/6

#linux #structure
2🔥2
Networking Basics: OSI, TCP/IP, Protocols & Ports

A beginner-friendly guide to networking fundamentals, covering the OSI and TCP/IP models, common protocols, and essential ports to help you understand how data moves across networks.

https://arcnet.am/post/8

#networking #osi7 #tcpip #protocol #port
32👍1
3 EASY BUGS FOR QUICK WINS IN BUG BOUNTY

Three vulnerabilities, one target. From injecting malicious configs into Swagger UI to hijacking an abandoned subdomain and bypassing API auth with a single header — here's how I found them and why they matter.

https://arcnet.am/post/10

#htmli #swagger
3🔥2
When Online Orders Cost Nothing: Lessons from a Platform Vulnerability

A case study on how weak email validation and authentication flaws can lead to unexpected vulnerabilities in online platforms.

https://arcnet.am/post/16

#web_security #vulnerability
3🔥2
Modern Unix in 2026: What's Replacing Classic Linux Command-Line Tools

A guide to modern CLI tools written in Rust and Go that replace classic Unix commands grep, ls, cat, find, top with faster performance and smarter defaults. Includes installation steps and shell aliases.

https://arcnet.am/post/19

#modern_unix #open_source #cli #terminal #linux
3🔥2
EASY ACCOUNT TAKEOVER USING IDOR (Bug Bounty)

Changing one number in a URL shouldn't give you someone else's account—but it often does. Insecure Direct Object Reference (IDOR) remains one of the most critical yet overlooked web vulnerabilities, frequently leading to full account takeover with minimal effort.

https://arcnet.am/post/7

#bug_hunt #idors
3🔥2
THE BUG BOUNTY BLUEPRINT: HACK LEGALLY, GET PAID (2026 EDITION)

Complete bug bounty guide for 2026: platforms that pay, real-world vulnerabilities, and the hacker mindset. Learn how to find critical bugs and get paid legally.

https://arcnet.am/post/11

#bug_bounty
3🔥2
How I Found a Critical Swagger Exposure in a Web Application

During testing, I discovered that the test environment's Swagger UI at https://[test-api-domain]/swagger/index.html is fully accessible to anyone on the internet without any authentication. This endpoint returns a complete OpenAPI/Swagger specification containing all API endpoints, request/response schemas, data models, and internal architecture details.

https://arcnet.am/post/18

#swagger #api #web_security
14😱2🔥1
Web Security Handbook: 16 Exploits You Must Know

Master the 16 most critical web vulnerabilities every hacker and security professional must know. From SQL Injection to SSRF, this hands-on guide breaks down how they work, why they matter, and how to find them .

https://arcnet.am/post/3

#exploit #websecuirty
4🔥3
🚀 Welcome to ArcNET — a tech community built by enthusiasts, for enthusiasts.

We are a technology forum where developers, engineers, IT professionals, and tech lovers come together to share knowledge, solve problems, and stay ahead of the curve. 💡

🔧 What We Do
📰 Tech news and industry updates
📝 In-depth tutorials and how-to guides
⚖️ Product reviews and comparisons
💬 Developer discussions and Q&A
🤝 Networking with like-minded tech professionals

Whether you're a beginner or a seasoned pro, ArcNET is your space to learn, share, and grow. 🌱

🌐 Visit us: arcnet.am
111💘3👨‍💻21👍1🔥1
ArcNET pinned «🚀 Welcome to ArcNET — a tech community built by enthusiasts, for enthusiasts. We are a technology forum where developers, engineers, IT professionals, and tech lovers come together to share knowledge, solve problems, and stay ahead of the curve. 💡 🔧 What…»
Best GitHub Repositories for Claude Code: 9 Essential Tools for Developers in 2026

Claude Code is powerful out of the box, but these 9 open-source repos take it to another level. From persistent memory and design intelligence to spec-driven development and workflow automation, here's everything you need to build faster and better.

https://arcnet.am/post/25

#open_source #claude_code #context_engineering
234👾1
How I Broke a Production Dashboard In Few Minutes

A simple API test turned into a full dashboard failure in under few minutes. No exploits, no hacks , just a missing limit.

https://arcnet.am/post/36

#rate_limiting #bug_bounty #api
16🔥31😁1🙊1
Advanced NoSQL Injection

A Comprehensive Practitioner's Guide to Exploitation, Bypasses, and Strategy

https://arcnet.am/post/38

#hacking #attacks #bug_bounty #web_security #api
7🔥4❤‍🔥2