Investigating a Hacked Webserver with Ecnrypted PHP Webshell | HackTheBox Obscure
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by…
We covered the enumeration of Redis NoSQL database server and exploitation using SSH. This was part of…
We covered another hardware hacking challenge from hackthebox where we analyzed an signal file captured using software-defined…
We covered OverTheWire Natas 19-20 level. In this level, the web application used an if statement to…
We covered the fourth part of hardware hacking series where we used HackTheBox Signals for demonstration purposes….
We covered OverTheWire Natas 19-20 level. This level was similar to the previous level but with the…
We covered the hardware hacking challenge from HackTheBox The Needle where we analyzed a Linux firmware using…
We used Burp Suite to demonstrate an experiment on enumerating sessions IDs created using PHP language. The…
We covered another hardware hacking challenge where we demonstrated an analysis of an archived file that was…
We covered the first hardware hacking challenge where we inspected a rootfs image and using the appropriate…
We covered Oracle Database Exploitation with Metasploit framework and oracle database attacking tool as part of Pwn…
We covered an introduction to blockchain penetration testing by taking on a blockchain challenge from HackTheBox where…
We covered an incident response scenario that involved a using memory forensics to investigate the presence of…
We covered time based SQL injection using the sleep function. Time time based SQL injection relies in…
We covered the concept of printer exploitation using printer exploitation framework. The scenario involved a printer running…
We covered a binary vulnerable to format string vulnerability in which the vulnerable code contains an implementation…
We covered OverTheWire Natas Level 16 CTF where we went over a blind SQL injection scenario that…
We covered another case of a binary vulnerable to buffer overflow but has some protections enabled such…
We covered a scenario of blind SQL Injection where the web application accepts user input without sanitization…
We covered another scenario of exploiting a binary vulnerable to buffer overflow. This scenario presented a binary…