HTTP Headers Attacks Explained | Linux Privilege Escalation | Vulnhub CTF
HTTP Header (X-Forwarded-For) 🔹 What is the X-Forwarded-For Header? 🔹 The Exploit 🔹 Steps to Exploit Prevention…
HTTP Header (X-Forwarded-For) 🔹 What is the X-Forwarded-For Header? 🔹 The Exploit 🔹 Steps to Exploit Prevention…
This article explores how VOIP web applications, specifically MagnusBilling, can be exploited using simple command-line techniques. This…
The article is an in-depth forensics guide on how to analyze the NTFS (New Technology File System)…
This article discusses data exfiltration techniques using the HTTP protocol, explaining why HTTP is one of the…
This article is a deep dive into Telnet, covering enumeration, exploitation, penetration testing and security concerns related…
Introduction This post walks through a digital forensics challenge where a slow-running PC is suspected to be…
Introduction This post is a tutorial on SQL Injection attacks, particularly testing for vulnerabilities in a machine…
Introduction HackTheBox MagicGardens Writeup details the exploitation of a Django-based web application. We demonstrate how to identify…
Introduction This post walks through the HackTheBox Yummy machine, showcasing multiple vulnerabilities that must be chained together…
Introduction The HackTheBox Cicada machine is a Windows-based challenge focusing on Active Directory exploitation. This walkthrough demonstrates…
The post covers real-time SOC (Security Operations Center) analysis with a focus on phishing detection and response…
In this post , we investigate a Windows machine that was compromised using a privilege escalation vulnerability…
The “Cyber Security 101” track on TryHackMe is an excellent starting point for individuals eager to delve…
Network forensics is an essential branch of cybersecurity that focuses on monitoring, analyzing, and investigating network traffic…
Introduction HackTheBox Spookifier presents a web application designed to generate spooky versions of user-provided names. However, the…
Introduction In HackTheBox Flag Command, we ffectively used enumeration, DevTools, and JavaScript analysis to bypass the normal…
This post walks through the investigation of a security incident case named SOC336 using letsdefend.io, specifically analyzing…
Introduction Linux forensics is an essential part of digital investigations, focusing on analyzing system activity, identifying security…
Gobuster is a popular tool for web enumeration and penetration testing, used to discover directories, subdomains, and…
Introduction In HackTheBox Strutted, we begin by identifying an Apache Struts vulnerability through enumeration. By crafting a…