SQL Injection Vulnerability Explained | TryHackMe Junior Penetration Tester
Introduction We covered the types of SQL injection vulnerability namely error based, time based, blined and boolean…
Introduction We covered the types of SQL injection vulnerability namely error based, time based, blined and boolean…
Introduction We covered Meterpreter as a post-exploitation tool from Metasploit. This video covered most popular commands and…
Introduction We covered command injection vulnerability and how input sanitisation and validation are critical in preventing exploiting…
Introduction We used Nmap and Hydra to perform scanning and enumeration of services and credentials. We also…
Introduction We covered the Burp Suite proxy settings in addition to the scope and target settings as…
Introduction We covered the basics of the Repeater in Burp Suite and we presented an example using…
Introduction We covered cross site scripting vulnerability through different levels of security. We used TryHackMe Junior Penetration…
Introduction We covered navigating directories and searching through files with Powershell. This was part of Day 20…
Introduction We covered discovering and enumerating hidden content on any website. This room was part of TryHackMe…
Introduction We covered SSRF vulnerability as part of TryHackMe SSRF room from the Junior Penetration Tester pathway….
Introduction We covered file inclusion vulnerability both local and remote. We also explained methods of bypassing filters….
Introduction Vulnerability Research is a three rooms challenge and part of the Junior Penetration Tester pathway Vulnerabilities…
Introduction In this video walk-through, we covered enumerating Rsync and performed packet sniffing with Tcpdump to extract…
Introduction In this video walk-through, we covered investigating BlackMatter ransomware with ProcDOT. You can use ProcDOT to…
In this video walk-through, we have covered various security concepts such as extracting NTLM hashes and testing…
In this video walk-through, we covered Linux Privilege Escalation through the cron tab in Linux. Cron tab…
In this video walk-through, we covered finding vulnerabilities in Influx Database in addition to docker exploitation. Sweettooth…
Introduction In this video walk-through, we covered SSRF or Server Side Request Forgery Vulnerability and how to…
Premise In this video walkthrough, we covered how to investigate the Cerber Ransomware and find its related…
Premise In this video walkthrough, we covered how to hunt and identify advanced persistent threat with Splunk…