Feb 12 · 14 min read · In this write-up, I'll document my journey through the Data Encoding room on TryHackMe. Building upon the Number Systems and Colors room where we learned that computers store everything as binary, this room answers a critical question: if everything ...
Join discussion
Feb 11 · 6 min read · 🚀 Introduction This writeup documents my journey through the Mother's Secrets challenge on TryHackMe, part of the DevSecOps learning path. The challenge presents a compelling scenario inspired by the 1979 sci-fi classic "Alien," where players must i...
Join discussion
Jan 24 · 10 min read · Overview "The Evil Within" is a TryHackMe CTF challenge inspired by the psychological horror video game of the same name. Created by ShalindaFdo as their first room, this challenge tasks us with helping Sebastian and his team of investigators survive...
Join discussion
Nov 3, 2025 · 6 min read · Đôi nét về Docker Compose Với những ai chưa biết thì Docker Compose là một công cụ đi kèm với Docker, giúp người dùng định nghĩa và quản lý nhiều container trong một ứng dụng chỉ bằng một tệp cấu hình duy nhất. Có thể hiểu đơn giản là thay vì phải ch...
Join discussion
Nov 3, 2025 · 5 min read · An Overview of Docker Compose For those who don't know, Docker Compose is a tool that comes with Docker, helping users define and manage multiple containers in an application with a single configuration file. Simply put, instead of running multiple c...
Join discussion
Sep 30, 2025 · 6 min read · What is Path Traversal(PT)? With PT an attacker could read many files on a server, in other words, reach files outside the intended folder.Example: Credentials for back-end systems Sensitive operating system files In some cases the attacker could...
Join discussion
Jul 25, 2025 · 15 min read · Introduction Introduction File Inclusion and Path Traversal are vulnerabilities that arise when an application allows external input to change the path for accessing files. For example, imagine a library where the catalogue system is manipulated to a...
Join discussion
May 24, 2025 · 2 min read · Introduction Today, I'm sharing my hands-on adventure through a real-world lab from PortSwigger's Web Security Academy, where I successfully exploited a Path Traversal vulnerability to read the sensitive /etc/passwd file. If you've ever wondered how ...
Join discussion
Oct 5, 2024 · 1 min read · Một challenges đơn giản khai thác vulnerables Path Traversal Mới vào challenges cho chúng ta một site thế này: Xem thử tấm hình, ta thấy path file=/ có khả năng bị path traversal. Test thử bằng cách truyền đường dẫn tương đối ../../../etc/passwd. T...
Join discussion