Exploiting Pluck CMS and Linux Privilege Escalation | TryHackMe Dreaming
We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version…
We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version…
Nebula Level 05 Description Check the flag05 home directory. You are looking for weak directory permissions To…
Nebula Level 08 Description World readable files strike again. Check what that user was up to, and…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by…
We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as…
In this video walkthrough, we covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to…
We covered basics of Encryption and Cryptography by answering the questions in TryHackMe Encryption – Crypto 101…
This post provides an introduction to DFIR (Digital Forensics and Incident Response) and covers its definition, process,…
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from…
We covered the enumeration of Redis NoSQL database server and exploitation using SSH. This was part of…
We covered a practical scenario on command injection using TryHackMe Epoch room. Challenge Description Be honest, you…
We covered another hardware hacking challenge from hackthebox where we analyzed an signal file captured using software-defined…
We covered the process of incident response and the steps taken to investigate and recover an infected…
We covered OverTheWire Natas 19-20 level. In this level, the web application used an if statement to…
We covered the fourth part of hardware hacking series where we used HackTheBox Signals for demonstration purposes….
We covered OpenVPN security by configuring strong encryption cyphers, setting secure hashing for authentication and implementing Perfect…
We covered OverTheWire Natas 19-20 level. This level was similar to the previous level but with the…
We covered the hardware hacking challenge from HackTheBox The Needle where we analyzed a Linux firmware using…
We covered the boot2root challenge Athena from TryHackMe. We scanned the machine with Nmap and discovered SMB…
We used Burp Suite to demonstrate an experiment on enumerating sessions IDs created using PHP language. The…