When a website lets users introduce some type of data, it may be open to a File Inclusion attack, granting hackers access to the server.
Continue Reading#FromZeroToHacker
Day 019 #FromZeroToHacker – Insecure Direct Object Reference or IDOR
Insecure Direct Object Reference or IDOR, is a relatively easy-to-spot vulnerability that can grant us access to things we shouldn’t have access to.
Continue ReadingDay 018 #FromZeroToHacker – Authentication Bypass
Let’s defeat logins and other authentication mechanisms that allow us access to unpermitted areas by learning about Authentication Bypass.
Continue ReadingDay 017 #FromZeroToHacker – Subdomain enumeration
Time to learn the various ways of discovering subdomains to expand your attack surface of a target by finding hidden routes in a website.
Continue ReadingDay 016 #FromZeroToHacker – Content discovery
There are ways to discover private content that is hidden in a web server. Let’s see how we can discover that elusive information.
Continue ReadingDay 015 #FromZeroToHacker – Checking under the hood of a website
Hackers on TV type in terminals, but there are simpler ways to attack a website with just your browser and a set of in-built tools.
Continue ReadingDay 014 #FromZeroToHacker – Windows Fundamentals: Part 3
Let’s learn how to keep our Windows device secure with Windows Updates, Windows Security, BitLocker and more.
Continue ReadingDay 013 #FromZeroToHacker – Windows Fundamentals: Part 2
Time to go deeper in our Windows knowledge: Let’s learn about System Configuration, how to modify UAC settings, what resource monitoring is, how the Windows registry works and more.
Continue ReadingDay 012 #FromZeroToHacker – Windows Fundamentals: Part 1
Like Linux, Windows is a whole beast on its own. Different system files, utilities, settings, features, etc. Things we need to know to understand, exploit and defend Windows.
Continue ReadingDay 011 #FromZeroToHacker – Linux Fundamentals: Part 3
Time to power up our Linux skills and get hands-on with some common Linux utilities and command that we will use in our day-to-day.
Continue Reading