How Can XSS Be Used to Access Sensitive Files | TryHackMe The Sticker Shop
The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site…
The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site…
In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full…
In this post, I will be solving and providing walkthrough and answers for Advent of Cyber 2024…
We covered the basics and fundamentals of reverse engineering using an example room from tryhackme. The post…
Introduction HackTheBox Brutus is a beginner-level DFIR challenge that includes an auth.log file and a wtmp file…
Introduction This post provides a comprehensive walkthrough of the HTB Lantern machine , detailing the steps taken…
This post provides a comprehensive introduction to PowerShell, a Microsoft-developed task automation and configuration management framework. It…
The post provides an in-depth walkthrough of exploiting and enumerating MySQL Services as part of a penetration…
Introduction In this walkthrough, we explore the “Crane” machine from OffSec’s Proving Grounds. This walkthrough demonstrates the…
Introduction The “SpookyPass” challenge from Hack The Box’s Hack The Boo 2024 event is a reverse engineering…
Introduction In HackTheBox PermX, we explore the Permx machine from Hack The Box (HTB), focusing on exploiting…
The Windows API enables direct interaction with core components of the Windows operating system, making it a…
The post provides a detailed walkthrough of using Volatility, a forensic analysis tool, to investigate a memory…
This post focuses on bypassing file upload filters to exploit vulnerabilities in web applications. It demonstrates techniques…
The post provides an in-depth walkthrough of a TryHackMe room focused on Linux Strength Training, targeting beginner…
Introduction In this post, we covered Python programming basics for penetration testers and cyber security specialists. We…
Introduction HackTheBox Abyss challenge is categorized as an Easy-level pwn challenge that revolves around exploiting a custom…
Introduction In HackTheBox No Gadgets ,we have a classic buffer overflow but with a unique twist: commonly…
Introduction When entering the cybersecurity field, certifications play a crucial role in establishing your knowledge and skills….
Introduction This post covered an introduction to Cyber Threat Intelligence, its lifecycle and frameworks such as MITRE…