Skip to Content

Threatninja.net

Security Awareness for all users

    Threatninja.net

    Security Awareness for all users

    • About us
      • Advisor/Mentor
      • Author Profile
      • Blog’s Purpose
      • Collabation
      • Contact
    • Tutorial
      • OffSec
      • HackTheBox
        • Machine
          • Easy
          • Medium
          • Hard
          • Insane
      • TryHackMe
    • CheatSheet
      • Cyber Kill Chain
      • Penetration Testing Report Tutorial
      • Security Framework
      • Shell
    • Penetration Testing Jobs
    • Search for:

    1. Home
    15 Jan, 2023
    Hack The Box: (Shoppy Machine) NoSQLi attack
    Uncategorized

    What is NoSQL Injection? Before we proceed with the NoSQL Injection details, we need to understand the NoSQL databases which it has provided low consistency restrictions if compared to SQL databases. Most of the time, the attack might execute from

    Continue ReadingHack The Box: (Shoppy Machine) NoSQLi attack

    7 Jan, 2023
    Learning Series: Docker Escape Method
    Penetration Testing

    What is Docker Escape Method? Firstly, we are required to understand the importance of Docker escape or also containers escape which was infrastructure that is used by virtual or day-to-day operations for all enterprises. The case of cybersecurity incidents is

    Continue ReadingLearning Series: Docker Escape Method

    7 Jan, 2023
    Learning Series: XML External Entity Injection Attack
    Penetration Testing

    What is XML external entity injection? XML external entity injection is a security vulnerability that normally allows a bad guy by executing the XML data of the application’s processing. A bad guy will able to view files on the application

    Continue ReadingLearning Series: XML External Entity Injection Attack

    2 Jan, 2023
    Protected: Providing Ground: Djinn3 Machine Walkthrough – Hard Difficulty
    Uncategorized

    There is no excerpt because this is a protected post.

    30 Dec, 2022
    Learning Series: How to detect vulnerabilities in the application
    Penetration Testing

    In this post, I would like to share my experience on how to detect some vulnerabilities within the application itself. A lot of people did ask me how I manage to detect any vulnerabilities with no information (blindly) at all

    Continue ReadingLearning Series: How to detect vulnerabilities in the application

    30 Dec, 2022
    Learning Series: Server-side request forgery(SSRF) Attack
    Penetration Testing

    What is SSRF? For those who are not familiar with Server-side request forgery or also known as SSRF, it’s a vulnerability that resides within web applications that allow the threat actors to make a request for an unintended location. The

    Continue ReadingLearning Series: Server-side request forgery(SSRF) Attack

    29 Dec, 2022
    Learning Series: Cloud Penetration Testing (AWS)
    Penetration Testing, Uncategorized

    In the post, i would like to share some knowledge on Cloud Penetration Testing for learning purposes What is Cloud Penetration Testing? There are some Penetration Testing that has been executed within the organization and one of them is Cloud

    Continue ReadingLearning Series: Cloud Penetration Testing (AWS)

    26 Dec, 2022
    Learning Series: API Penetration Testing
    Penetration Testing
    API, Linux, Penetration Testing, Vulnerabilities

    What is API Penetration Testing? For those who are not familiar with API Penetration Testing, it’s a test activity that involves all the processes of vulnerability assessment and ensures that the client is implementing very solid endpoints for their APIs

    Continue ReadingLearning Series: API Penetration Testing

    25 Dec, 2022
    Learning Series: Play around with Kerberos using the Impacket script
    Penetration Testing
    HackTheBox, Impacket script, Learning Series, Penetration Testing, Tools, Windows OS

    A little bit of explanation on Kerberos and Impacket In this post, I would like to share my knowledge and skills about the Kerberos which we will take advantage of Impacket script For those who are not familiar with Kerberos,

    Continue ReadingLearning Series: Play around with Kerberos using the Impacket script

    13 Dec, 2022
    Learning Series: IDOR Vulnerability explained
    Penetration Testing
    CyberSecurity Risk, Penetration Testing, Security, Vulnerabilities

    In this post, I would like to share some information on the Insecure Direct Object Reference (IDOR) vulnerability. What is IDOR Vulnerability? For those who are not familiar with IDOR vulnerability, it’s an attack type that accesses control vulnerability that

    Continue ReadingLearning Series: IDOR Vulnerability explained

    Posts pagination

    1 … 20 21 22 … 37
    Copyright © 2026 Threatninja.net | Powered by Neom