THM – Command Injection – Part 11

THM – Command Injection – Part 11

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is Command Injection? Command injection is the abuse of an application’s behaviour to execute commands on the operating system, using the same privileges that the application on a device…

THM – SSRF – Part 9

THM – SSRF – Part 9

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is an SSRF? SSRF stands for Server-Side Request Forgery. It’s a vulnerability that allows a malicious user to cause the webserver to make an additional or edited HTTP request…

THM – File Inclusion – Part 8

THM – File Inclusion – Part 8

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Introduction What is File inclusion? In some scenarios, web applications are written to request access to files on a given system, including images, static text, and so on via parameters. Parameters…

THM – IDOR – Part 7

THM – IDOR – Part 7

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is an IDOR? IDOR stands for Insecure Direct Object Reference and is a type of access control vulnerability. This type of vulnerability can occur when a web server receives…

THM – Authentication Bypass – Part 6

THM – Authentication Bypass – Part 6

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Username Enumeration A helpful exercise to complete when trying to find authentication vulnerabilities is creating a list of valid usernames Website error messages are great resources for collating this information…

THM – Subdomain Enumeration – Part 5

THM – Subdomain Enumeration – Part 5

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Brief Subdomain enumeration is the process of finding valid subdomains for a domain. We do this to expand our attack surface to try and discover more potential points of vulnerability….

THM – Content Discovery – Part 4

THM – Content Discovery – Part 4

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. What is content Discovery? This content could be, for example, pages or portals intended for staff usage, older versions of the website, backup files, configuration files, administration panels, etc. There…

THM – Walking An Application – Part 3

THM – Walking An Application – Part 3

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Introduction View Source – Use your browser to view the human-readable source code of a website. Inspector – Learn how to inspect page elements and make changes to view usually blocked content….

THM – Principles of Security – Part 2

THM – Principles of Security – Part 2

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Principles of Privileges The levels of access given to individuals are determined on two primary factors: The individual’s role/function within the organisation The sensitivity of the information being stored on…

THM – Intro to pentesting – Fundamentals – Part 1

THM – Intro to pentesting – Fundamentals – Part 1

This is my notes from the Junior Pentesting course at TryHackMe. This course takes you through the basics and some advanced topics regarding penetration testing. Penetration testing ethics Hat Category Description Example White Hat These hackers are considered the “good people”. They remain within the law and use their skills to benefit others. For example,…

HTB – Horizontall CTF

HTB – Horizontall CTF

This was an interesting box where the objective was to use known vulnerabilites to gain access and to root the machine. The initial phase was kind of challenging as the foothold was kind of tricky to aquire. Enumeration The NMAP scan result show us that port 22 and port 80 is open. We can also…

THM – Common Linux Privilege Escalation – Part 20

THM – Common Linux Privilege Escalation – Part 20

This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Direction og Privilege Escalation Two main privilege escalation variants. Horizontal privilege escalation Expand your reach over the compromised system by taking over a…