We can hack a machine to gain access to its internal server resources with Server-Side Request Forgery. Let’s learn how.
Continue ReadingHacking
Day 021 #FromZeroToHacker – Connecting to TryHackMe via Oracle VM
Let’s learn how we can install Kali Linux (or any OS, really) on a Virtual Machine to keep learning how to hack with all of its tools!
Continue ReadingDay 020 #FromZeroToHacker – File Inclusion
When a website lets users introduce some type of data, it may be open to a File Inclusion attack, granting hackers access to the server.
Continue ReadingDay 019 #FromZeroToHacker – Insecure Direct Object Reference or IDOR
Insecure Direct Object Reference or IDOR, is a relatively easy-to-spot vulnerability that can grant us access to things we shouldn’t have access to.
Continue ReadingDay 018 #FromZeroToHacker – Authentication Bypass
Let’s defeat logins and other authentication mechanisms that allow us access to unpermitted areas by learning about Authentication Bypass.
Continue ReadingDay 017 #FromZeroToHacker – Subdomain enumeration
Time to learn the various ways of discovering subdomains to expand your attack surface of a target by finding hidden routes in a website.
Continue ReadingDay 016 #FromZeroToHacker – Content discovery
There are ways to discover private content that is hidden in a web server. Let’s see how we can discover that elusive information.
Continue ReadingDay 015 #FromZeroToHacker – Checking under the hood of a website
Hackers on TV type in terminals, but there are simpler ways to attack a website with just your browser and a set of in-built tools.
Continue ReadingDay 014 #FromZeroToHacker – Windows Fundamentals: Part 3
Let’s learn how to keep our Windows device secure with Windows Updates, Windows Security, BitLocker and more.
Continue ReadingDay 013 #FromZeroToHacker – Windows Fundamentals: Part 2
Time to go deeper in our Windows knowledge: Let’s learn about System Configuration, how to modify UAC settings, what resource monitoring is, how the Windows registry works and more.
Continue Reading