A basic introduction to sending and receiving (Both Reverse and Bind) shells when exploiting target machines.
Continue ReadingDay 036 #FromZeroToHacker – What the Shell? Part 1
A basic introduction to sending and receiving (Both Reverse and Bind) shells when exploiting target machines.
Continue ReadingDay 035 #FromZeroToHacker – Web Enumeration
Time to learn the methodology of enumerating websites using tools such as Gobuster, Nikto and WPScan.
Continue ReadingDay 034 #FromZeroToHacker – OWASP Juice Shop Writeup
OWASP Juice Shop give us a good intro to what a CTF is. While they hand-hold you during this challenge, you get to know what a CTF looks like.
Continue ReadingDay 033 #FromZeroToHacker – OWASP top 10 (2021)
Nothing fancy today. I had to go early to my mother’s so I’m doing small, basic-level tutorial-like rooms from TryHackMe to clear them.
Continue ReadingDay 031 #FromZeroToHacker – Miscellany tutorials
Nothing fancy today. I had to go early to my mother’s so I’m doing small, basic-level tutorial-like rooms from TryHackMe to clear them.
Continue ReadingDay 030 #FromZeroToHacker – Burp Suite Extender
Burp Suite Extender lets us expand our Burp Suite installation with additional modules created for the community. You can even create your own modules too!
Continue ReadingDay 029 #FromZeroToHacker – Burp Suite Other Modules
Along with Repeater and Intruder, Burp Suite has several slightly less well-known modules built-in: Decoder, Comparer, and Sequencer
Continue ReadingDay 028 #FromZeroToHacker – Burp Suite Intruder
We have already covered Proxy and Repeater modules. Now, it is time for the third module: Intruder.
Continue ReadingDay 027 #FromZeroToHacker – Burp Suite Repeater
After covering the Basics of Burp Suite, it is time to dive into one of the more important modules of the framework: The Burp Suite Repeater module.
Continue Reading