Let's learn about

Tutorials and learning resources for programmers

  • Home
  • #FromZeroToHacker
  • Tutorials.py
  • Utils.py
  • About…
burp suite

Day 026 #FromZeroToHacker – Burp Suite Basics

Burp Suite is the industry standard tool for web application hacking and is essential in any web penetration test.

Time to learn all we can do in today’s challenge.

27 June, 202329 June, 2023#FromZeroToHacker, Burp Suite, Ethical hacker, Hacking, TryHackMe
Continue Reading
SQL Injection

Day 025 #FromZeroToHacker – SQL Injection attacks

SQL injection, often referred to as SQLi, is an attack on a web application database server that causes malicious queries to be executed.

26 June, 202327 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Command Injection

Day 024 #FromZeroToHacker – Command Injection

Time to open terminals in other’s machines with Command Injection and wreak havoc!

25 June, 202325 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Cross-Site Scripting

Day 023 #FromZeroToHacker – Cross-Site Scripting (XSS)

Time to learn how to detect and exploit XSS (Cross-site Scripting) vulnerabilities, giving us control of other visitors’ browsers.

23 June, 202323 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
SSRF

Day 022 #FromZeroToHacker – Server-Side Request Forgery

We can hack a machine to gain access to its internal server resources with Server-Side Request Forgery. Let’s learn how.

23 June, 202323 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
VirtualBox logo

Day 021 #FromZeroToHacker – Connecting to TryHackMe via Oracle VM

Let’s learn how we can install Kali Linux (or any OS, really) on a Virtual Machine to keep learning how to hack with all of its tools!

22 June, 202323 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
File Inclusion

Day 020 #FromZeroToHacker – File Inclusion

When a website lets users introduce some type of data, it may be open to a File Inclusion attack, granting hackers access to the server.

20 June, 20234 July, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading

Day 019 #FromZeroToHacker – Insecure Direct Object Reference or IDOR

Insecure Direct Object Reference or IDOR, is a relatively easy-to-spot vulnerability that can grant us access to things we shouldn’t have access to.

20 June, 20233 July, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Authentication bypass

Day 018 #FromZeroToHacker – Authentication Bypass

Let’s defeat logins and other authentication mechanisms that allow us access to unpermitted areas by learning about Authentication Bypass.

18 June, 202319 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Subdomain enumeration

Day 017 #FromZeroToHacker – Subdomain enumeration

Time to learn the various ways of discovering subdomains to expand your attack surface of a target by finding hidden routes in a website.

17 June, 202328 June, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading

Posts pagination

Previous 1 … 6 7 8 … 17 Next
Lynis logo

Security auditing your Linux OS with Lynis

25 January, 2024
Docker

Creating our own Docker images

12 January, 2024
Docker

Docker basics for beginners

7 January, 2024

Vagrant tutorial for beginners

7 January, 2024

The Linux File System: A simple guide for beginners

1 November, 2023

Follow me on Twitter

My Tweets