Server Side Includes Injection Explained | EP1 | H.A.S.T.E Vulnhub Walkthrough CTF We covered the solution to H.A.S.T.E Vulnhub machine and we demonstrated Server Side Includes Injection that led to gaining access to the…
Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough We covered the solution of Docker VulnHub lab where we performed a penetration testing for a Docker container running a WordPress website.
PhpMyAdmin Command Injection | EP1 | Zico2 VulnHub CTF Walkthrough We covered the first part of Zico2 VulnHub CTF Walkthrough where we demonstrated command injection in an old version of PhpMyAdmin database…
From Web Into SSH Shell | Covfefe VulnHub CTF WalkThrough We demonstrated a simple boot2root CTF walkthrough named, Covfefe, where we performed an initial Nmap scan followed by directory discovery…
OWASP Hackaedmic CTF Walkthrough OWASP Hackademic collection of Web Application Penetration Testing challenges is very good start if you are getting started in web hacking…
OSINT Case Studies P2 | Blockchain & Manhunt | HackTheBox Block Hunt3r & Missing in action We covered the second part of open source intelligence case studies as part of HackTheBox OSINT track. The first challenge, block hunt3r…
Web Application Vulnerability Scanning with OWASP ZAP | TryHackMe In this video walk-through, we covered OWASP ZAP web application vulnerability scanner to perform vulnerability scanning on a lab…
Open Source Intelligence Case Studies | HackTheBox Easy Phish, Infiltration & ID Exposed. We covered multiple OSINT case studies and challenges from HackTheBox, namely Easy Phish, Infiltration & ID Exposed, where we demonstrated…
MITRE ATT&CK Framework APT28 | Cyber Security Case Study | TryHackMe Eviction We covered a practical case study where we discussed the tactics, techniques and procedures used by advanced persistent group APT28. As a…
Clearing Tracks in Windows | TryHackMe Evading Logging & Monitoring We covered techniques and methods in clearing tracks and evading Windows event logging. First we explained the components of Event Tracing…
Bypassing Anti-Malware Scanning Interface (AMSI) Explained | TryHackMe Runtime Detection Evasion We covered the concept of runtime detection using Anti-Malware Scanning Interface (AMSI). We also covered common bypass methods such as…