Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    Category Archives: Penetration Testing

    1. Home  - Masterclass
    2. Archive by category "Penetration Testing"
    3. ( Page2 )
    15 Oct, 2022
    Learning Series: Server-Side Template Injection (SSTI)
    Penetration Testing Challenges, Cybersecurity, CyberSecurity Risk, Linux, Penetration Testing

    What is Server-Side Template Injection? An attack that allows the attacker to use the native template syntax to inject a few malicious payloads into the template is been called Server-side template injection or also known as SSTI. Normally, the attacks

    Continue ReadingLearning Series: Server-Side Template Injection (SSTI)

    10 Oct, 2022
    Learning Series: Directory Traversal Attack Method
    Penetration Testing Learning, Owasp, Website

    In this post, I want to share on Directory Traversal Attack Method which can be useful during any Red Teaming OR Penetration Testing Before I share the demo of the attack over here, let’s study the methodology and the process

    Continue ReadingLearning Series: Directory Traversal Attack Method

    2 Jan, 2022
    Web Application Assessment using Burp Suite
    Penetration Testing BurpSuite, Penetration Testing, Web Application

    Web Application Assessment Information Firstly, we need to understand why Web Application Assessment is important to any organization out there. As people should be aware by now, Web Applications have played an important and vital role in an organization’s future

    Continue ReadingWeb Application Assessment using Burp Suite

    4 Oct, 2020
    Database Penetration Testing
    Penetration Testing Database, Oracle, Penetration Testing

    In this post, I would like to share knowledge and experience while doing Database Penetration Testing. The purpose of Penetration Testing is to find vulnerabilities within the system and simulate the controlled environment if there is any cybersecurity attack which

    Continue ReadingDatabase Penetration Testing

    1 Aug, 2020
    QRLJACKING and QRLJACKER
    Penetration Testing Cybersecurity, QRLcode, Tools

    In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new method that most people might not even heard before. QRLJacking

    Continue ReadingQRLJACKING and QRLJACKER

    1 Mar, 2020
    AWS Penetration Testing Review
    Penetration Testing AWS, Cloud, Penetration Testing, Privileges Escalation

    What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in during Red Team Activities. The finding that might catch the eyes of the attacker would

    Continue ReadingAWS Penetration Testing Review

    1 Feb, 2020
    XML Injection Attack review
    Penetration Testing Masterclass, Penetration Testing, XML Injection

    In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar with XML Injection attack, XML Injection is an method that been used by the attacker

    Continue ReadingXML Injection Attack review

    15 Jan, 2020
    Penetration Testing using Python Code
    Penetration Testing Nmap, Penetration Testing, Python

    Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful for other people out there.

    Continue ReadingPenetration Testing using Python Code

    3 Jan, 2020
    Cross-origin resource sharing Review
    Penetration Testing Browser, Masterclass

    Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules such as Access-Cross-Allow-Origin: However, this

    Continue ReadingCross-origin resource sharing Review

    24 Dec, 2019
    Cross-Site Scripting Tutorial
    Penetration Testing Browser, Cross Site Scripting

    Cross-site Scripting is an attack where the attacker will enable to insert client-side script into the application to gain access control and data of the application. An example of common Cross-Site Scripting that I do believe everyone is well-aware of

    Continue ReadingCross-Site Scripting Tutorial

    Posts pagination

    1 2 3
    Copyright © 2026 Threatninja.net | Powered by Neom