Tag: Vulnerabilities

Hack The Box: (UpDown) Upload Phar File for RCE

What is Phar Deserizalition to Remote Code Execution? Phar file also known as PHP Archive…

Learning Series: API Penetration Testing

What is API Penetration Testing? For those who are not familiar with API Penetration Testing,…

Learning Series: IDOR Vulnerability explained

In this post, I would like to share some information on the Insecure Direct Object…

Learning Series: SQL Injection attack method

In this post, I would like to share some knowledge about SQL Injection which can…

Hack The Box: (Unintended) way to get Root Privileges Access using the latest version JuicyPotato

What is JuicyPotato Vulnerability? Those who have experienced Pentester and had a good time testing…

Hack the box: Vessel Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Vessel Machine from Hack the…

Hack The Box: Health Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Health Machine from Hack the…

Hack The Box: Outdated Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Outdated Machine from Hack the…

Hack The Box: Moderators Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Moderators Machine from Hack the…

Hack The Box: Faculty Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Faculty Machine from Hack the…