22 Jan, 2023 Hack The Box: (UpDown) Upload Phar File for RCE Medium Machine Challenges, HackTheBox, Penetration Testing, Vulnerabilities
26 Dec, 2022 Learning Series: API Penetration Testing Penetration Testing API, Linux, Penetration Testing, Vulnerabilities
13 Dec, 2022 Learning Series: IDOR Vulnerability explained Penetration Testing CyberSecurity Risk, Penetration Testing, Security, Vulnerabilities
31 Oct, 2022 Learning Series: SQL Injection attack method Penetration Testing Cybersecurity, Penetration Testing, Security, SQL Injection, sqlmap, Vulnerabilities
17 Oct, 2022 Hack The Box: (Unintended) way to get Root Privileges Access using the latest version JuicyPotato Insane Machine Challenges, HackTheBox, Vulnerabilities, Windows
10 Sep, 2022 Hack the box: Vessel Machine Walkthrough – Hard Difficulty Hard Machine BurpSuite, Challenges, curl, feroxbuster, git, git-dumper, HackTheBox, linpeas, Linux, Node.js, OpenWeb Analytics, Penetration Testing, pwncat-cs, SQL Injection, Vulnerabilities
5 Sep, 2022 Hack The Box: Health Machine Walkthrough – Medium Difficulty Medium Machine base64, Challenges, gogs, HackTheBox, Linux, MySQL, mysql database, nc listener, Penetration Testing, python3, ssh, union sqli, Vulnerabilities, webhook
3 Sep, 2022 Hack The Box: Outdated Machine Walkthrough – Medium Difficulty Medium Machine Challenges, follina, HackTheBox, nc64.exe, net user, ntlm, Penetration Testing, python3, rubeus.exe, sharphound, SharpWSUS, smbclient, swaks, Vulnerabilities, Windows
16 Aug, 2022 Hack The Box: Moderators Machine Walkthrough – Hard Difficulty Hard Machine BurpSuite, Challenges, chisel, curl, cyberchef, file upload, gobuster, HackTheBox, Linux, MySQL, mysql database, Penetration Testing, port forwarding, pwncat-cs, python3, ssh, SSH key, sudo, Vulnerabilities, wfuzz, Wordpress
15 Jul, 2022 Hack The Box: Faculty Machine Walkthrough – Medium Difficulty Medium Machine authentication, BurpSuite, capabilities, Challenges, file read, gdb, gobuster, HackTheBox, Linux, meta-git, mpdf, Penetration Testing, source code review, SQL Injection, ssh, Vulnerabilities