EEEmma Engströminpentesting-dvwa.hashnode.dev00DOM-Based XSS in DVWA 6d ago · 14 min read · Introduction This post examines a DOM-based cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) and demonstrates how it can be exploited to achieve client-side code Join discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00JavaScript Attacks in DVWAMar 26 · 20 min read · 1 Introduction In this post, the JavaScript Attacks vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to analyse and manipulate the JJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00Stored XSS in DVWAMar 25 · 12 min read · Introduction This post examines a Stored Cross-Site Scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA), and demonstrates how it can be used to achieve persistent client-side cJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00API Security in DVWAMar 21 · 24 min read · 1 Introduction In this post, the API Security vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks across all security levels is to exploit weaknesses inJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00Reflected XSS in DVWAMar 19 · 14 min read · Introduction This post demonstrates how a reflected Cross-Site Scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) can be exploited to execute malicious client-side scripts in Join discussion
MMichiinrandomtechnotes.hashnode.dev00Virtual Machine Migration from UTM to VirtualBoxMar 17 · 3 min read · Migrating virtual machines between hypervisors is very well documented if you want to move towards QEMU / UTM. Going the other direction is a different story. In this case, moving a VM from UTM to VirJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00CSP Bypass in DVWAMar 14 · 13 min read · 1 Introduction In this post, the Content Security Policy (CSP) Bypass vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to bypass theJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00Authorisation Bypass in DVWAMar 8 · 12 min read · 1 Introduction In this post, the Authorisation Bypass vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to identify any areas where aJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00SQL Injection in DVWAMar 6 · 17 min read · 1 Introduction In this post, the SQL Injection vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to extract user login credentials. Join discussion
SPSaad Patelinsaad-patel.hashnode.dev00🐧 Day 7: Working with Linux Servers: Access Methods and Networking SetupFeb 19 · 4 min read · Purpose Before moving to the next DevOps tools, it is important to understand how we actually work with Linux systems in real environments. This document explains common ways to access Linux servers aJoin discussion