Security Awareness for all users

Tag Vulnerabilities

Hack The Box: (UpDown) Upload Phar File for RCE

What is Phar Deserizalition to Remote Code Execution? Phar file also known as PHP Archive will normally contain metadata that is written in a serialized format. As a result, the bad guys can abuse the vulnerability related to deserialized that… Continue Reading →

Learning Series: API Penetration Testing

What is API Penetration Testing? For those who are not familiar with API Penetration Testing, it’s a test activity that involves all the processes of vulnerability assessment and ensures that the client is implementing very solid endpoints for their APIs… Continue Reading →

Learning Series: IDOR Vulnerability explained

In this post, I would like to share some information on the Insecure Direct Object Reference (IDOR) vulnerability. What is IDOR Vulnerability? For those who are not familiar with IDOR vulnerability, it’s an attack type that accesses control vulnerability that… Continue Reading →

Learning Series: SQL Injection attack method

In this post, I would like to share some knowledge about SQL Injection which can be useful during Penetration Testing activity. Before we went deeper into it, I will try to explain what is SQL Injection for those who are… Continue Reading →

Hack The Box: (Unintended) way to get Root Privileges Access using the latest version JuicyPotato

What is JuicyPotato Vulnerability? Those who have experienced Pentester and had a good time testing with Windows Escalation Method, they are surely heard about JuicyPotato at least once. Therefore, for people out, there should not fret who are not familiar… Continue Reading →

Hack the box: Vessel Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Vessel Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Vessel machine? For the user flag,… Continue Reading →

Hack The Box: Health Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Health Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the health machine? For the user flag,… Continue Reading →

Hack The Box: Outdated Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Outdated Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Outdated machine? For the user flag,… Continue Reading →

Hack The Box: Moderators Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Moderators Machine from Hack the Box This room will be considered a Hard machine on Hack The Box What will you gain from the Moderators machine? For the user flag,… Continue Reading →

Hack The Box: Faculty Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Faculty Machine from Hack the Box This room will be considered a Medium machine on Hack The box What will you gain from the faculty machine? For the user flag,… Continue Reading →

« Older posts

© 2024 Threatninja.net — Powered by Threatninja