Metasploitable 1 | Complete Walkthrough Tutorial We covered the first part of Metasploitable 1 lab where we demonstrated Twiki exploitation and Linux privielge escalation through kernel…
Web Application Exploitation | EP1 | C0m80 Vulnhub CTF challenge We covered the solution for C0m80 Vulnhub where we demonstrated the exploitation of Mantis bug tracker web application and at the end…
Game of Thrones CTF Walkthrough Vulnhub We covered the first part solution of Game of Thrones CTF Vulnhub where we gathered the challenge flags using various active information…
WordPress Penetration Testing | EP1 | LazySysAdmin VulnHub Walkthrough CTF We covered the solution of LazySysAdmin VulnHub machine where we covered WordPress Penetration Testing & exploiting SMB shares.
Server Side Includes Injection Explained | EP1 | H.A.S.T.E Vulnhub Walkthrough CTF We covered the solution to H.A.S.T.E Vulnhub machine and we demonstrated Server Side Includes Injection that led to gaining access to the…
Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough We covered the solution of Docker VulnHub lab where we performed a penetration testing for a Docker container running a WordPress website.
PhpMyAdmin Command Injection | EP1 | Zico2 VulnHub CTF Walkthrough We covered the first part of Zico2 VulnHub CTF Walkthrough where we demonstrated command injection in an old version of PhpMyAdmin database…
From Web Into SSH Shell | Covfefe VulnHub CTF WalkThrough We demonstrated a simple boot2root CTF walkthrough named, Covfefe, where we performed an initial Nmap scan followed by directory discovery…
OWASP Hackaedmic CTF Walkthrough OWASP Hackademic collection of Web Application Penetration Testing challenges is very good start if you are getting started in web hacking…
OSINT Case Studies P2 | Blockchain & Manhunt | HackTheBox Block Hunt3r & Missing in action We covered the second part of open source intelligence case studies as part of HackTheBox OSINT track. The first challenge, block hunt3r…
Web Application Vulnerability Scanning with OWASP ZAP | TryHackMe In this video walk-through, we covered OWASP ZAP web application vulnerability scanner to perform vulnerability scanning on a lab…
Open Source Intelligence Case Studies | HackTheBox Easy Phish, Infiltration & ID Exposed. We covered multiple OSINT case studies and challenges from HackTheBox, namely Easy Phish, Infiltration & ID Exposed, where we demonstrated…