Based on a report from IBM, human errors were the main reason for 95% of successful cyber attacks. That is why security awareness is so important.
Continue ReadingEthical hacker
Day 066 #FromZeroToHacker – XML eXternal Entity (XXE) attacks
XXE injection is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. Let’s learn the different ways we can do this.
Continue ReadingDay 066 #FromZeroToHacker – Google Dorking
Google Dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use.
Continue ReadingDay 065 #FromZeroToHacker – Introductory Researching
Hacking requires a wide knowledge base that is impossible to attain: New things get patched, discovered and modified every day.
Continue ReadingDay 064 #FromZeroToHacker – Python for begginers
Python is an incredible tool for Pentesters. From creating scripts to creating our own security tools, Python is an easy to learn language.
Continue ReadingDay 061 to 063 #FromZeroToHacker – Windows privilege escalation
Often we find Windows hosts with an unprivileged user that we can elevate privileges from,using this to escalate to an administration account.
Continue ReadingDay 057 to 060 #FromZeroToHacker – Linux privilege escalation
There are no one solution for all the scenarios when dealing with Linux privilege escalation: It depends on the configuration of the target .
Continue ReadingDay 056 #FromZeroToHacker – Metasploit Meterpreter
Meterpreter is a Metasploit payload that supports the penetration testing process, as we use it to interact with the target OS.
Continue ReadingDay 055 #FromZeroToHacker – Metasploit Exploitation
Today we are going to learn how to use Metasploit for vulnerability scanning and exploitation.
Continue ReadingDay 054 #FromZeroToHacker – Metasploit Introduction
Metasploit is the most widely used exploitation framework that supports all phases of a penetration testing engagement.
Continue Reading