A summary of what I learned during my #100DaysOfHacking challenge
Read MoreMy #100DaysOfHacking Challenge Summary
Learn and practice exploiting a range of unique web vulnerabilities - JWT tools
Read MoreTryHackMe > Web Fundamentals: ZTH: Obscure Web Vulns – Part 6: JWT
Learn and practice exploiting a range of unique web vulnerabilities - JWT None
Read MoreTryHackMe > Web Fundamentals: ZTH: Obscure Web Vulns – Part 4: JWT None
Understand how cross-site scripting occurs and how to exploit it - Reflected + DOM-based XSS
Read MoreTryHackMe > Web Fundamentals: Cross-site Scripting – Part 2: Reflected + DOM XSS
This room aims at providing the basic introduction to XML External Entity (XXE vulnerability)
Read MoreTryHackMe > Web Fundamentals: XXE
In the previous blog post, I showed you how to bypass poorly configured authentication via dictionary attack or re-registration. Today, I'm going to speak about JWT - what it is, how it works and one of possible ways to exploit it.
Read MoreTryHackMe > Web Fundamentals: Authenticate – Part 2
Learn how to attack authentication mechanisms used in web applications
Read MoreTryHackMe > Web Fundamentals: Authenticate – Part 1
Understand and exploit a web server that is vulnerable to the Local File Inclusion (LFI) vulnerability.
Read MoreTryHackMe > Web Fundamentals: LFI
Learn how to use OWASP ZAP from the ground up. An alternative to BurpSuite.
Read MoreTryHackMe > Web Fundamentals: Introduction to OWASP ZAP
This is the first blog post written to this page and its purpose is to explain why this page exists in the first place.
Read MoreWhy this website?