Docker Privilege Escalation and SSTI Exploitation | HackTheBox GoodGames
We covered HackTheBox GoodGames as part of CREST CRT track. We went over SQL Injection, server side…
We covered HackTheBox GoodGames as part of CREST CRT track. We went over SQL Injection, server side…
We covered HackTheBox Active as part of CREST CRT (registered penetration tester track). We went through Exploiting…
We covered Insecure Direct Object Reference vulnerability exploitation along with Python privilege escalation as part of HackTheBox…
We covered HackTheBox FriendZone as part of CREST CRT track. We went over DNS zone transfer, SMB…
We enumerate NFS shares, and upload a Web Shell . We also performed Linux privilege escalation by…
RedCross From HackTheBox was like a maze, with several different paths to achieve shell and root. We’ll…
TryHackMe Opacity is an easy machine that can help you in the penetration testing learning process. We…
We come upon a website that lists some fictional firm employees’ entire names. We create some usernames…
We covered information security management concepts such as information security governance, information security regulations, risk management and…
We covered another file upload vulnerability where the vulnerable code contained a PHP function exif_imagetype to check…
We explored encryption and secure remote access as methods to secure and harden Linux. Encryption makes data…
We covered a basic introduction to Linux firewalls IPTABLES and UFW as a means to ensure security….
We covered User Accounts Security best practices such as disabling root account login, setting password expiry date,…
We covered Linux enumeration to identify possible weaknesses vulnerabilities in order to achieve privilege escalation. This was…
We covered basic dynamic malware analysis using process monitor to uncover network connections, processes spawned by the…
We covered Dynamic Malware Analysis using API Calls monitoring and logging using tools such as API Logger…
We covered dynamically analyzing malware using process explorer to discover DLLs, handles, resource consumption, network activity and…
We covered managing identities and access through identification, authentication, authorization and accountability. We also covered every single…
We covered dynamic malware analysis by analyzing and comparing changes and modifications done on the registry using…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from…