Mohamed Hegazih0kaz.hashnode.dev·Apr 18, 2024TryHackMe: XSS RoomRoom URL: TryHackMe | XSS Explore in-depth the different types of XSS and their root causes. Task 1: Introduction Cross-site scripting (XSS) remains one of the common vulnerabilities that threaten web applications to this day. XSS attacks rely on inj...Discuss·66 readstryhackme
Sky Davispayloadgiovanni.hashnode.dev·Apr 12, 2024Hydra-Password Hacking (Tryhackme Write Up)It's been awhile since I've done a TryHackMe room but I'm back ! I'm currently in school for Cyber Crime and Digital Investigations , however how can I solve a cyber crime if I don't know how criminal think ? Pentesting will give me the critical thin...Discusspentesting
Darshilciphersec.hashnode.dev·Apr 7, 2024Walkthrough of Linux File System AnalysisIntroduction: In this room, you will explore the Linux file system to understand its structure, examine various files, and perform analysis to uncover potential vulnerabilities and misconfigurations. Task 1: Connect to TryHackMe VPN Access the TryHa...Discusstryhackme
chris tchassemchris21.hashnode.dev·Mar 24, 2024How to gain access into a bank's web application (THM Lab session)💡 In order to get through this article, you need to have some basic understandings on computer networks and linux systems. This lab is replicable as you can find it on the website TryHackMe.com First step is to setup your environment with the appr...Discusspenetration testing
Terminal Intelligence Securityterminalintelligencesecurity.hashnode.dev·Mar 10, 2024Perfection HTB WriteupDuring enumeration, it was noticed that Input validation bypass refers to exploiting weaknesses in an application’s validation checks to submit malicious data that bypasses intended restrictions. Attackers use techniques like filter evasion, context ...Discuss·539 readsPerfection-walkthrough,
Sm1l3xsmilex.hashnode.dev·Mar 10, 2024Cryptography|TryHackMe|Task5:HashingA cryptographic hash function is an algorithm that takes data of arbitrary size as its input and returns a fixed size value, called message digest or checksum, as its output. For example, sha256sum calculates the SHA256 (Secure Hash Algorithm 256) me...Discusstryhackme
Niccolo Lampathedatalife.com·Feb 12, 2024TryHackMe - Linux Privilege Escalation: Capstone ChallengeThis article discusses the solution for TryHackMe's Linux Privilege Escalation Kernel Capstone Challenge tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to ...Discuss·40 readsCTF
Niccolo Lampathedatalife.com·Feb 11, 2024TryHackMe - Linux Privilege Escalation: SudoThis article discusses the solution for TryHackMe's Linux Privilege Escalation Kernel Sudo tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to give it your a...Discuss·31 readsSecurity
Niccolo Lampathedatalife.com·Feb 11, 2024TryHackMe - Linux Privilege Escalation: Kernel ExploitsThis article discusses the solution for TryHackMe's Linux Privilege Escalation Kernel Exploits tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to give it yo...Discusspentesting
Niccolo Lampathedatalife.com·Feb 11, 2024TryHackMe - Linux Privilege Escalation: NFSThis article discusses the solution for TryHackMe's Linux Privilege Escalation SUID task so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to give it your all until...Discusshacking