Published inSystem WeaknessThe Software Development Logic Behind Subfinder and AssetfinderSubdomain enumeration is a critical first step in mapping out an organization’s digital footprint.Feb 20Feb 20
Published inT3CHMr Robot | RCE via Penelope Shell HandlerExploiting remote code execution and reverse shell vulnerabilities in the TryHackMe Mr. Robot machine using Penelope and PHP syntax.Feb 21Feb 21
Published inSystem WeaknessPentesting Backend Course Project | CTIS256Learn how to compete with live web applications.Jan 12Jan 12
Published inT3CHBreak Out The CageLearn how to perform privilege escalation methods called vertical & horizontal vectors and extended fuzzing operations.Dec 24, 2024Dec 24, 2024
Published inT3CHHacker101 CTF | Photo GalleryLearn detailed SQLi vulnerabilities like boolean-based and time-based SQL injection. Moreover usage of the sqlmap.Dec 19, 20241Dec 19, 20241
Published inSystem WeaknessArchangel | LFI to RFI, Crontab Exploitation and PATH ManipulationLearn PATH manipulation to escalate your privileges and crontab abusement.Dec 10, 2024Dec 10, 2024
Published inT3CHEncrypted Pastebin | Method Manipulation, Padding Oracle and Input Validation FlawsIn this article, I would like to share my solution on hard level challenge called Encrypted Pastebin from Hacker101 platform.Dec 7, 2024Dec 7, 2024
Published inSystem WeaknessMicro-CMS v2 | SQLi, Bruteforce, Inconsistent Authorization ChecksDiscover many of the known owasp vulnerabilities including union based SQLi and bruteforce via Burpsuite and THCHydra. Data exposure, IDOR.Dec 5, 2024Dec 5, 2024
Published inT3CHHacker101 CTF [1–2]Learn how to understand the web applications’ behaviors against different attack vectors including unauthorized access, XSS and SQLi.Dec 1, 20241Dec 1, 20241
Published inSystem WeaknessA Real-World Web Application Penetration Testing Story | Small Mistakes Leads to Major Logic FlawsLearn how to perform real-world penetration testing approach called Logic Flaws.Nov 27, 2024Nov 27, 2024