Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Yearly Archives: 2022

    1. Home  - 
    2. 2022
    30 Dec, 2022
    Learning Series: How to detect vulnerabilities in the application
    Penetration Testing

    In this post, I would like to share my experience on how to detect some vulnerabilities within the application itself. A lot of people did ask me how I manage to detect any vulnerabilities with no information (blindly) at all

    Continue ReadingLearning Series: How to detect vulnerabilities in the application

    30 Dec, 2022
    Learning Series: Server-side request forgery(SSRF) Attack
    Penetration Testing

    What is SSRF? For those who are not familiar with Server-side request forgery or also known as SSRF, it’s a vulnerability that resides within web applications that allow the threat actors to make a request for an unintended location. The

    Continue ReadingLearning Series: Server-side request forgery(SSRF) Attack

    29 Dec, 2022
    Learning Series: Cloud Penetration Testing (AWS)
    Penetration Testing, Uncategorized

    In the post, i would like to share some knowledge on Cloud Penetration Testing for learning purposes What is Cloud Penetration Testing? There are some Penetration Testing that has been executed within the organization and one of them is Cloud

    Continue ReadingLearning Series: Cloud Penetration Testing (AWS)

    26 Dec, 2022
    Learning Series: API Penetration Testing
    Penetration Testing API, Linux, Penetration Testing, Vulnerabilities

    What is API Penetration Testing? For those who are not familiar with API Penetration Testing, it’s a test activity that involves all the processes of vulnerability assessment and ensures that the client is implementing very solid endpoints for their APIs

    Continue ReadingLearning Series: API Penetration Testing

    25 Dec, 2022
    Learning Series: Play around with Kerberos using the Impacket script
    Penetration Testing HackTheBox, Impacket script, Learning Series, Penetration Testing, Tools, Windows OS

    A little bit of explanation on Kerberos and Impacket In this post, I would like to share my knowledge and skills about the Kerberos which we will take advantage of Impacket script For those who are not familiar with Kerberos,

    Continue ReadingLearning Series: Play around with Kerberos using the Impacket script

    13 Dec, 2022
    Learning Series: IDOR Vulnerability explained
    Penetration Testing CyberSecurity Risk, Penetration Testing, Security, Vulnerabilities

    In this post, I would like to share some information on the Insecure Direct Object Reference (IDOR) vulnerability. What is IDOR Vulnerability? For those who are not familiar with IDOR vulnerability, it’s an attack type that accesses control vulnerability that

    Continue ReadingLearning Series: IDOR Vulnerability explained

    13 Dec, 2022
    Hack The Box: (Outdated Machine) Using WSUS attack
    Medium Machine HackTheBox, Penetration Testing, SharpWSUS, Tools, Windows, WSUS

    In the post, I would like to share some tricks that I learned such as using the WSUS Trick while playing with the Outdated Machine which the walkthrough over here I’m not really good with Windows Operating System and this

    Continue ReadingHack The Box: (Outdated Machine) Using WSUS attack

    31 Oct, 2022
    Learning Series: SQL Injection attack method
    Penetration Testing Cybersecurity, Penetration Testing, Security, SQL Injection, sqlmap, Vulnerabilities

    In this post, I would like to share some knowledge about SQL Injection which can be useful during Penetration Testing activity. Before we went deeper into it, I will try to explain what is SQL Injection for those who are

    Continue ReadingLearning Series: SQL Injection attack method

    24 Oct, 2022
    Hack The Box: (Unintended Way) To obtain a root shell using CVE-2022-2588 Vulnerability on Faculty HTB
    Medium Machine

    In this post, I would like to share some Unintended ways to obtain the root shell by using the vulnerability of the Faculty machine that recently retired which can be read here Enumerate the Faculty HTB server using linpeas script

    Continue ReadingHack The Box: (Unintended Way) To obtain a root shell using CVE-2022-2588 Vulnerability on Faculty HTB

    22 Oct, 2022
    Learning Series: Bypass AV detection using HoaxShell
    Penetration Testing

    In this post, I would like to share a way to bypass AV detection by using HoaxShell which that tool has been created by t3l3machus. What is HoaxShell? HoaxShell is a tool that contains unconventional Windows Reverse Shell which can

    Continue ReadingLearning Series: Bypass AV detection using HoaxShell

    Posts pagination

    1 2 … 6
    Copyright © 2026 Threatninja.net | Powered by Neom