@AdhamMohamed
Penetration Tester
Nothing here yet.
Nothing here yet.
Feb 17 · 3 min read · ReactOOPS is a web-focused challenge that demonstrates how modern JavaScript frameworks can introduce critical backend vulnerabilities when misconfigured. In this walkthrough, we enumerate a Next.js application, identify a vulnerable React Server Com...
Join discussionFeb 12 · 5 min read · Crocodile is a beginner-friendly Linux room that focuses on fundamental enumeration techniques, including Nmap scanning, anonymous FTP access, and directory brute forcing. In this walkthrough, we will take a structured approach to identifying exposed...
Join discussionFeb 10 · 3 min read · This write-up follows the same format and structure as my previous articles, combining short theoretical questions with a practical walkthrough to demonstrate how a misconfigured MySQL/MariaDB service can expose sensitive data. Task 1 During our sca...
Join discussionFeb 8 · 3 min read · This article focuses on identifying and exploiting a misconfigured Redis service using the Redeemer room on HackTheBox. It combines essential theory with hands-on enumeration to show how exposed Redis instances can leak sensitive data. Task 1 Which ...
Join discussion