Session ID Hijacking With Burp Suite | OverTheWire Natas Level 20
We covered OverTheWire Natas 19-20 level. In this level, the web application used an if statement to…
We covered OverTheWire Natas 19-20 level. In this level, the web application used an if statement to…
We covered the fourth part of hardware hacking series where we used HackTheBox Signals for demonstration purposes….
We covered OpenVPN security by configuring strong encryption cyphers, setting secure hashing for authentication and implementing Perfect…
We covered OverTheWire Natas 19-20 level. This level was similar to the previous level but with the…
We covered the hardware hacking challenge from HackTheBox The Needle where we analyzed a Linux firmware using…
We covered the boot2root challenge Athena from TryHackMe. We scanned the machine with Nmap and discovered SMB…
We used Burp Suite to demonstrate an experiment on enumerating sessions IDs created using PHP language. The…
We covered another hardware hacking challenge where we demonstrated an analysis of an archived file that was…
We covered the first hardware hacking challenge where we inspected a rootfs image and using the appropriate…
We covered some basic security and hardening techniques that can be implemented on Windows server systems with…
We covered the second part of malware static analysis. We went through analyzing strings, hashes and signatures….
We covered the first part of Phishing Email Analysis with PhishTool. We demonstrated key areas to consider…
We covered the Print Nightmare Exploit from a defensive perspective where we performed an incident response and…
We covered hashing functions including MD5 and SHA256 in addition to public key infrastructure and SSL/TLS certificates….
A local privilege escalation (LPE) vulnerability in Windows was reported to Microsoft on September 9, 2022, by…
We covered Oracle Database Exploitation with Metasploit framework and oracle database attacking tool as part of Pwn…
We covered two methods to escape docker containers including the method of mounting the full host file…
We covered secure network architecture design concepts such as VLANs, security zones, access control lists, DNS snooping…
We covered an introduction to blockchain penetration testing by taking on a blockchain challenge from HackTheBox where…
We covered a boot to root machine where we started with an Nmap scan to discover several…