Skip to content
BOOK_GHANIM

BOOK_GHANIM

  • ProgrammingExpand
    • C#
    • Python
  • CyberSecExpand
    • Articles
    • HandbooksExpand
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • GuidesExpand
    • HomeLab
    • Homelab Cheatsheet
  • HandbooksExpand
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search
BOOK_GHANIM
BOOK_GHANIM
  • THM – SQL Injection – Part 12
    Notes

    THM – SQL Injection – Part 12

    Byaghanim January 1, 2022January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is a database? A database is a way of electronically storing collections of data in an organised manner. A database is controlled by a DBMS which is an acronym…

    Read More THM – SQL Injection – Part 12Continue

  • THM – Command Injection – Part 11
    Notes

    THM – Command Injection – Part 11

    Byaghanim December 30, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is Command Injection? Command injection is the abuse of an application’s behaviour to execute commands on the operating system, using the same privileges that the application on a device…

    Read More THM – Command Injection – Part 11Continue

  • THM – Cross-site scripting (XSS) – Part 10
    Notes

    THM – Cross-site scripting (XSS) – Part 10

    Byaghanim December 30, 2021March 24, 2023

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. XSS Payloads What is a payload? In XSS, the payload is the JavaScript code we wish to be executed on the target computer. There are two parts to the payload,…

    Read More THM – Cross-site scripting (XSS) – Part 10Continue

  • THM – SSRF – Part 9
    Notes

    THM – SSRF – Part 9

    Byaghanim December 30, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is an SSRF? SSRF stands for Server-Side Request Forgery. It’s a vulnerability that allows a malicious user to cause the webserver to make an additional or edited HTTP request…

    Read More THM – SSRF – Part 9Continue

  • THM – File Inclusion – Part 8
    Notes

    THM – File Inclusion – Part 8

    Byaghanim December 30, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Introduction What is File inclusion? In some scenarios, web applications are written to request access to files on a given system, including images, static text, and so on via parameters. Parameters…

    Read More THM – File Inclusion – Part 8Continue

  • THM – IDOR – Part 7
    Notes

    THM – IDOR – Part 7

    Byaghanim December 30, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is an IDOR? IDOR stands for Insecure Direct Object Reference and is a type of access control vulnerability. This type of vulnerability can occur when a web server receives…

    Read More THM – IDOR – Part 7Continue

  • THM – Authentication Bypass – Part 6
    Notes

    THM – Authentication Bypass – Part 6

    Byaghanim December 22, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Username Enumeration A helpful exercise to complete when trying to find authentication vulnerabilities is creating a list of valid usernames Website error messages are great resources for collating this information…

    Read More THM – Authentication Bypass – Part 6Continue

  • THM – Subdomain Enumeration – Part 5
    Notes

    THM – Subdomain Enumeration – Part 5

    Byaghanim December 22, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Brief Subdomain enumeration is the process of finding valid subdomains for a domain. We do this to expand our attack surface to try and discover more potential points of vulnerability….

    Read More THM – Subdomain Enumeration – Part 5Continue

  • THM – Content Discovery – Part 4
    Notes

    THM – Content Discovery – Part 4

    Byaghanim December 22, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is content Discovery? This content could be, for example, pages or portals intended for staff usage, older versions of the website, backup files, configuration files, administration panels, etc. There…

    Read More THM – Content Discovery – Part 4Continue

  • THM – Walking An Application – Part 3
    Notes

    THM – Walking An Application – Part 3

    Byaghanim December 22, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Introduction View Source – Use your browser to view the human-readable source code of a website. Inspector – Learn how to inspect page elements and make changes to view usually blocked content….

    Read More THM – Walking An Application – Part 3Continue

  • THM – Principles of Security – Part 2
    Notes

    THM – Principles of Security – Part 2

    Byaghanim December 22, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Principles of Privileges The levels of access given to individuals are determined on two primary factors: The individual’s role/function within the organisation The sensitivity of the information being stored on…

    Read More THM – Principles of Security – Part 2Continue

  • THM – Intro to pentesting – Fundamentals – Part 1
    Notes

    THM – Intro to pentesting – Fundamentals – Part 1

    Byaghanim December 22, 2021January 25, 2022

    This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Penetration testing ethics Hat Category Description Example White Hat These hackers are considered the “good people”. They remain within the law and use their skills to benefit others. For example,…

    Read More THM – Intro to pentesting – Fundamentals – Part 1Continue

  • HTB – Horizontall CTF
    Writeups

    HTB – Horizontall CTF

    Byaghanim October 25, 2021February 5, 2022

    This was an interesting box where the objective was to use known vulnerabilites to gain access and to root the machine. The initial phase was kind of challenging as the foothold was kind of tricky to aquire. Enumeration The NMAP scan result show us that port 22 and port 80 is open. We can also…

    Read More HTB – Horizontall CTFContinue

  • THM – Common Linux Privilege Escalation – Part 20
    Notes

    THM – Common Linux Privilege Escalation – Part 20

    Byaghanim September 29, 2021January 25, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Direction og Privilege Escalation Two main privilege escalation variants. Horizontal privilege escalation Expand your reach over the compromised system by taking over a…

    Read More THM – Common Linux Privilege Escalation – Part 20Continue

  • THM – What the Shell – Part 19
    Notes

    THM – What the Shell – Part 19

    Byaghanim September 29, 2021September 5, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. What is a shell? A shell is what we use when interfacing with a Command Line environment (CLI). Common bash or sh programs…

    Read More THM – What the Shell – Part 19Continue

Page navigation

Previous PagePrevious 1 2 3 4 5 6 7 Next PageNext

© 2025 BOOK_GHANIM

Search
  • Programming
    • C#
    • Python
  • CyberSec
    • Articles
    • Handbooks
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • Guides
    • HomeLab
    • Homelab Cheatsheet
  • Handbooks
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search