How Hackers Hack IT Support Systems | Exploiting PHP Vulnerabilities | TryHackMe Agent T
This article guides viewers through the methodology of scanning, identifying vulnerabilities, and exploiting a PHP-based server using…
This article guides viewers through the methodology of scanning, identifying vulnerabilities, and exploiting a PHP-based server using…
The HackTheBox Sp00ky Theme challenge walks you through how dangerous it can be when template engines in…
This article walks through a SOC (Security Operations Center) case from LetsDefend.io where a user receives a…
Introduction to HackTheBox Event Horizon Phishing attack against the CEOWe begin by explaining the background of the…
TryHackMe Hackfinity Battle Encor walkthrough begins with a warm greeting and a heads-up about the video’s two-hour…
Introduction to HackTheBox Greenhorn HackTheBox Greenhorn is categorized as an easy HackTheBox machine, but achieving root access…
Introduction to HackTheBox alphascii clashing Designed for beginners, HackTheBox Alphascii Clashing is a very-easy-level challenge that offers…
Introduction to HackTheBox Armaxis The “Armaxis” challenge from the HackTheBox University CTF 2024 involves exploiting vulnerabilities in…
This article explores cybersecurity flaws in dating apps, specifically injection attacks and cross-site scripting (XSS) exploits. The…
This article provides an in-depth analysis of the Risen ransomware, a malicious software designed to encrypt user…
Introduction to HackTheBox APT In this article, we covered various aspects of Active Directory Penetration Testing using…
This article covers enumerating and exploiting FTP in the TryHackMe Network Services room, part of the CompTIA…
HTTP Header (X-Forwarded-For) 🔹 What is the X-Forwarded-For Header? 🔹 The Exploit 🔹 Steps to Exploit Prevention…
This article explores how VOIP web applications, specifically MagnusBilling, can be exploited using simple command-line techniques. This…
The article is an in-depth forensics guide on how to analyze the NTFS (New Technology File System)…
This article discusses data exfiltration techniques using the HTTP protocol, explaining why HTTP is one of the…
This article is a deep dive into Telnet, covering enumeration, exploitation, penetration testing and security concerns related…
Introduction This post walks through a digital forensics challenge where a slow-running PC is suspected to be…
Introduction This post is a tutorial on SQL Injection attacks, particularly testing for vulnerabilities in a machine…
Introduction HackTheBox MagicGardens Writeup details the exploitation of a Django-based web application. We demonstrate how to identify…