Buna Byte Cybersecurity
847 subscribers
269 photos
10 videos
2 files
190 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
πŸ’Š Effort Shock: The Real Journey to Mastery

There's a concept called "Effort Shock," popularized by the article "How the Karate Kid Ruined the Entire World." Intrigued? Here's the summary: Anything worth mastering takes time, practice, and patience. We often expect quick results, but true skill and understanding don’t happen overnight.

In cybersecurity, just like any other field, you’ll need to invest significant time before feeling like you really know what’s going on. So, don’t let that initial struggle discourage you. Keep pushing forwardβ€”every bit of effort counts toward your journey to expertise! πŸ’ͺπŸ”
πŸ”₯10πŸ‘Œ1
#AdventOfCyber is HERE! πŸš¨πŸŽ…
πŸ”— https://lnkd.in/dqPF2mjx

Try Hack Me CTF Advent of Cyber 2024
Take on daily beginner-friendly challenges throughout December to be in with the chance of winning from our $100,000 prize draw πŸŽπŸŽ„
πŸ‘9😁1
Guys αŠ₯αŠ•α‹΄α‰΅ αŠ“α‰½αˆ I was thinking to creat a detailed walkthrough video as I solve the 2024 cyber advents.

Give πŸ‘ if you want to play with me and support me by subscribing to the Buna Byte YouTube channel.

πŸ‘‰https://www.youtube.com/@bunabyte
πŸ‘16❀4πŸ‘1
πŸ”₯9❀1
How to Set Up OpenVPN for TryHackMe in AmharicπŸ‘‡

https://youtu.be/o-wG2jpvzJk?si=ADxExwJffG4_YtYs
πŸ”₯9❀2
Guys join this live session you will learn a lot 😎 Gust πŸ‘‰Dr.Hundaol
πŸ‘7πŸ™1
Advent of Cyber (TryHackMe)Day 1 walkthrough is outπŸ‘‡

https://youtu.be/6MW2dfAj1Rk
πŸ‘14πŸ™1πŸ‘Œ1
From a book I recently enjoyed.
❀‍πŸ”₯14🫑2
Cross Site Scripting (XSS): it allows attacker to compromise interaction between user and the application. It works by manipulating vulnerable website so that it returns malicious Java Script to users.
TYPES OF XSS
1. Reflected XSS: arrives malicious script comes from the current HTTP request means it only affects the user that is interacted.
2. Stored XSS: malicious script comes from the website's database(later HTTP request).
3. DOM based XSS: when an application contains some client-side Java Script that process data from untrusted source.
πŸ‘12
🚨 XSS Challenge Follow-Up 🚨
Building on the last post about XSS, here's a quick challenge for you!

Analyze the following code snippet and comment below:
1️⃣ What makes this code vulnerable to XSS?
2️⃣ Which type of XSS attack could exploit this vulnerability?

<?php  
$search_query = $_GET['q'];
echo "<p>You searched for: $search_query</p>";
?>


Let’s see who can break it down! πŸ’»πŸ”₯
---

#bunabyte #XSS
πŸ‘10πŸ€·β€β™‚3
πŸš€ We’re working on something BIG!

Stay tuned for an exciting announcement that will change the game. πŸ”₯πŸ’»

#BBCS-IEH #bunabyte
πŸ”₯12🀩4❀1
Cybersecurity isn’t just about toolsβ€”it’s about mindset. Every ethical hacker starts as a beginner, questioning how things work and why. Don’t rush mastery; focus on understanding the basics deeply. Learn protocols, practice in labs, and embrace failureβ€”it’s the best teacher. Remember, ethical hacking is about protecting, not exploiting. πŸŒπŸ’»

#bunabyte #IEH
πŸ‘20