Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Category Archives: Masterclass

    1. Home  - 
    2. Archive by category "Masterclass"
    3. ( Page2 )
    22 Oct, 2022
    Learning Series: Bypass AV detection using HoaxShell
    Penetration Testing

    In this post, I would like to share a way to bypass AV detection by using HoaxShell which that tool has been created by t3l3machus. What is HoaxShell? HoaxShell is a tool that contains unconventional Windows Reverse Shell which can

    Continue ReadingLearning Series: Bypass AV detection using HoaxShell

    15 Oct, 2022
    Learning Series: Server-Side Template Injection (SSTI)
    Penetration Testing Challenges, Cybersecurity, CyberSecurity Risk, Linux, Penetration Testing

    What is Server-Side Template Injection? An attack that allows the attacker to use the native template syntax to inject a few malicious payloads into the template is been called Server-side template injection or also known as SSTI. Normally, the attacks

    Continue ReadingLearning Series: Server-Side Template Injection (SSTI)

    10 Oct, 2022
    Learning Series: Directory Traversal Attack Method
    Penetration Testing Learning, Owasp, Website

    In this post, I want to share on Directory Traversal Attack Method which can be useful during any Red Teaming OR Penetration Testing Before I share the demo of the attack over here, let’s study the methodology and the process

    Continue ReadingLearning Series: Directory Traversal Attack Method

    2 Oct, 2022
    Custom Binary Exploitation
    Information Security Binary Exploitation, Challenges, Cybersecurity, Penetration Testing

    In this post, I would like to explore more binary exploitation such as nreport which will improve my skills and knowledge. For a record, the binary file is coming from OverGraph Machine on Hack the Box Platform. Before we start

    Continue ReadingCustom Binary Exploitation

    2 Jan, 2022
    Web Application Assessment using Burp Suite
    Penetration Testing BurpSuite, Penetration Testing, Web Application

    Web Application Assessment Information Firstly, we need to understand why Web Application Assessment is important to any organization out there. As people should be aware by now, Web Applications have played an important and vital role in an organization’s future

    Continue ReadingWeb Application Assessment using Burp Suite

    19 Jan, 2021
    Cloud Implementation Best Practice
    Information Security Cloud, Cybersecurity

    I will share my experience on the Cloud Implementation Best Practices which don’t apply to any of my previous, or current organizations. My options would be off for certain organizations and individuals. Below are my top 5 Best Practice that

    Continue ReadingCloud Implementation Best Practice

    4 Jan, 2021
    Red Teaming Review
    Information Security Cybersecurity, Red Team

    On this post, I would discuss the Red Teaming activity where some organization will be using those team to test the system or application. For those are not familiar with the terms “Red Teaming”, it s a team which will

    Continue ReadingRed Teaming Review

    12 Dec, 2020
    Lateral Movement attack Review
    Information Security CyberSecurity Risk, Lateral Movement, Review

    What is Lateral Movement attack? For those are not familiar with Lateral Movement attack, it normally an attack that related to cyberattack techniques that used whenever they successfully gain initial access in order to go deeper within the network. The

    Continue ReadingLateral Movement attack Review

    4 Oct, 2020
    Database Penetration Testing
    Penetration Testing Database, Oracle, Penetration Testing

    In this post, I would like to share knowledge and experience while doing Database Penetration Testing. The purpose of Penetration Testing is to find vulnerabilities within the system and simulate the controlled environment if there is any cybersecurity attack which

    Continue ReadingDatabase Penetration Testing

    27 Sep, 2020
    Android Banking New Trojan
    Mobile Android, Information Security, Trojan; Mobile

    Recently, a trojan called Alien which is a new ‘fork’ of Cerberus Banking Trojan that normally targets victim’s credentials from more than 200 mobile applications includes Bank of America and Microsoft Outlook. Alien Trojan has been detected active since early

    Continue ReadingAndroid Banking New Trojan

    Posts pagination

    1 2 3 … 5
    Copyright © 2026 Threatninja.net | Powered by Neom