ArcNET
1.49K subscribers
65 photos
66 links
Tech news, tips, guides, and community updates, all in one place.

Join our community
https://t.me/arcnet_am_community
Download Telegram
Networking Basics: OSI, TCP/IP, Protocols & Ports

A beginner-friendly guide to networking fundamentals, covering the OSI and TCP/IP models, common protocols, and essential ports to help you understand how data moves across networks.

https://arcnet.am/post/8

#networking #osi7 #tcpip #protocol #port
3โค2๐Ÿ‘1
3 EASY BUGS FOR QUICK WINS IN BUG BOUNTY

Three vulnerabilities, one target. From injecting malicious configs into Swagger UI to hijacking an abandoned subdomain and bypassing API auth with a single header โ€” here's how I found them and why they matter.

https://arcnet.am/post/10

#htmli #swagger
3๐Ÿ”ฅ2
When Online Orders Cost Nothing: Lessons from a Platform Vulnerability

A case study on how weak email validation and authentication flaws can lead to unexpected vulnerabilities in online platforms.

https://arcnet.am/post/16

#web_security #vulnerability
3๐Ÿ”ฅ2
Modern Unix in 2026: What's Replacing Classic Linux Command-Line Tools

A guide to modern CLI tools written in Rust and Go that replace classic Unix commands grep, ls, cat, find, top with faster performance and smarter defaults. Includes installation steps and shell aliases.

https://arcnet.am/post/19

#modern_unix #open_source #cli #terminal #linux
3๐Ÿ”ฅ2
EASY ACCOUNT TAKEOVER USING IDOR (Bug Bounty)

Changing one number in a URL shouldn't give you someone else's accountโ€”but it often does. Insecure Direct Object Reference (IDOR) remains one of the most critical yet overlooked web vulnerabilities, frequently leading to full account takeover with minimal effort.

https://arcnet.am/post/7

#bug_hunt #idors
3๐Ÿ”ฅ2
THE BUG BOUNTY BLUEPRINT: HACK LEGALLY, GET PAID (2026 EDITION)

Complete bug bounty guide for 2026: platforms that pay, real-world vulnerabilities, and the hacker mindset. Learn how to find critical bugs and get paid legally.

https://arcnet.am/post/11

#bug_bounty
3๐Ÿ”ฅ2
How I Found a Critical Swagger Exposure in a Web Application

During testing, I discovered that the test environment's Swagger UI at https://[test-api-domain]/swagger/index.html is fully accessible to anyone on the internet without any authentication. This endpoint returns a complete OpenAPI/Swagger specification containing all API endpoints, request/response schemas, data models, and internal architecture details.

https://arcnet.am/post/18

#swagger #api #web_security
14๐Ÿ˜ฑ2๐Ÿ”ฅ1
Web Security Handbook: 16 Exploits You Must Know

Master the 16 most critical web vulnerabilities every hacker and security professional must know. From SQL Injection to SSRF, this hands-on guide breaks down how they work, why they matter, and how to find them .

https://arcnet.am/post/3

#exploit #websecuirty
4๐Ÿ”ฅ3
๐Ÿš€ Welcome to ArcNET โ€” a tech community built by enthusiasts, for enthusiasts.

We are a technology forum where developers, engineers, IT professionals, and tech lovers come together to share knowledge, solve problems, and stay ahead of the curve. ๐Ÿ’ก

๐Ÿ”ง What We Do
๐Ÿ“ฐ Tech news and industry updates
๐Ÿ“ In-depth tutorials and how-to guides
โš–๏ธ Product reviews and comparisons
๐Ÿ’ฌ Developer discussions and Q&A
๐Ÿค Networking with like-minded tech professionals

Whether you're a beginner or a seasoned pro, ArcNET is your space to learn, share, and grow. ๐ŸŒฑ

๐ŸŒ Visit us: arcnet.am
111๐Ÿ’˜3๐Ÿ‘จโ€๐Ÿ’ป2โค1๐Ÿ‘1๐Ÿ”ฅ1
ArcNET pinned ยซ๐Ÿš€ Welcome to ArcNET โ€” a tech community built by enthusiasts, for enthusiasts. We are a technology forum where developers, engineers, IT professionals, and tech lovers come together to share knowledge, solve problems, and stay ahead of the curve. ๐Ÿ’ก ๐Ÿ”ง Whatโ€ฆยป
Best GitHub Repositories for Claude Code: 9 Essential Tools for Developers in 2026

Claude Code is powerful out of the box, but these 9 open-source repos take it to another level. From persistent memory and design intelligence to spec-driven development and workflow automation, here's everything you need to build faster and better.

https://arcnet.am/post/25

#open_source #claude_code #context_engineering
23โค4๐Ÿ‘พ1
How I Broke a Production Dashboard In Few Minutes

A simple API test turned into a full dashboard failure in under few minutes. No exploits, no hacks , just a missing limit.

https://arcnet.am/post/36

#rate_limiting #bug_bounty #api
16๐Ÿ”ฅ3โค1๐Ÿ˜1๐Ÿ™Š1
Advanced NoSQL Injection

A Comprehensive Practitioner's Guide to Exploitation, Bypasses, and Strategy

https://arcnet.am/post/38

#hacking #attacks #bug_bounty #web_security #api
7๐Ÿ”ฅ4โคโ€๐Ÿ”ฅ2
SSRF for reconnaissance of the target's local network

How to use SSRF for a local network reconnaissance and which impacts have this vulnerability

https://arcnet.am/post/34

#hacking #bug_bounty #web_security #api
9โคโ€๐Ÿ”ฅ3๐Ÿ”ฅ3โค2
How to encode a file via Vim Linux file editor?

Honestly it's not that difficult, but lots of people don't know about the functions vim has, which is sad. Vim is a really good redactor (I use nano btw :))

https://arcnet.am/post/40

#algorithms #encryption #vim #linux #cryptography
10๐Ÿ”ฅ3โคโ€๐Ÿ”ฅ2โค1
Using a Smartphone as a BadUSB

How to use an Android Smartphone as a BadUSB

https://arcnet.am/post/41

#hacking #attacks #badusb #hid #android
10๐Ÿ”ฅ3โคโ€๐Ÿ”ฅ2
whoami? Yii survivor

How a single 'temporary' debug token exposed an entire distributed network.

https://arcnet.am/post/43

#hacking #web_security #api #algorithms #attacks
11โค4โคโ€๐Ÿ”ฅ2
Node.js Is Not Single-Threaded

"JavaScript is single-threaded" is true. But a Node.js process is a different story. Here's what's actually running under the hood.

https://arcnet.am/post/15

#nodejs #v8 #libuv #threading #software_engineering
10โคโ€๐Ÿ”ฅ5โค1
Thereโ€™s Someone Between You and the Internet

Your internet connection feels private. It's not. In a Man-in-the-Middle (MITM) attack, an attacker silently positions themselves between you and your router, intercepting everything you send and receive. This article breaks down how MITM works, what attackers can see, and includes a real technical example showing exactly how the attack is executed on a local network.

https://arcnet.am/post/39

#mitm #infosec #sniffing #arpspoof #attacks
4๐Ÿ”ฅ4โคโ€๐Ÿ”ฅ3๐Ÿ˜1
ิณีˆีิพิปี”ิฑิฟิฑิถี„, ีˆีิธ ีŠิตีี” ิท ิปี„ิฑี†ิฑ ี…ีˆี’ีิฑี”ิฑี†ี‰ี…ีˆี’ีิธ

ิปีถีนีบีฅีžีฝ ีฃีฟีถีฅีฌ ีกีตีถ, ีซีถีนีจ ีฉีกึ„ึีพีกีฎ ีง (Sublist3r, Dirb, WhatWeb, Wpscan)

https://arcnet.am/post/51

#hacking #bug_bounty #attacks #linux #open_source
9๐Ÿ”ฅ7โคโ€๐Ÿ”ฅ1
ี‘ีกีถึีฅึ€ี ีนีกีตีถีซีฏีถีฅึ€ีซ ีฐีกีดีกึ€ N1

ิปี†ีฟีฅึ€ีถีฅีฟ ึีกีถึีซ ีฏีกีผีธึ‚ึีพีกีฎึ„ีจ ึ‡ ีกีทีญีกีฟีกีถึ„ีจ

https://arcnet.am/post/54

#networking #osi7 #tcpip
6๐Ÿฆ„4๐Ÿ‘3๐Ÿ’˜2โคโ€๐Ÿ”ฅ1