[Vulnlab] SQL Injection - Find the passwords
Situation: We have a list of users and a search bar where we can input our SQLi. We also have access to the PHP source code. Our mission - passwords Find out columns First, I would start by f...
Situation: We have a list of users and a search bar where we can input our SQLi. We also have access to the PHP source code. Our mission - passwords Find out columns First, I would start by f...
Situation: We have the following login form and access to the php code. <?php require("../../../lang/lang.php"); $strings = tr(); $mysqli = new mysqli('localhost', 'sql_injection', '', 'sq...
Vulnlab Installation Installation Docker + Portainer Welcome! After a short break I created my own open source Vulnlab. It is hosted on a Docker Container on a Raspberry Pi 5. With Docker I can ...
TryHackMe- Relevant Tasks and Intruction user flag root flag Scope of Work The client requests that an engineer conducts an assessment of the provided virtual environment. The...
TryHackMe- Linux Privilege Escalation Introduction You have gained SSH access to a large scientific facility. Try to elevate your privileges until you are Root. We designed this room to help you...
TryHackMe- Net Sec Challenge Introduction In this room we can practise our learning from the Network Security module. It presents the Basisc in TCP/ UDP Protocols, Services/Ports and Encryption...
TryHackMe- Brooklyn-nine-nine Tasks user flag root flag Getting the user flag First we start a scan via nmap / rustscan. I prefer rustscan because it is way faster for scanning just open ...
TryHackMe- Sticker Shop TASKS What is the user flag? What is the root flag? Scan the target First we scan for open ports. I use Rustscanfor this, because the scanning is way faster than ...
TryHackMe- Sticker Shop Task & Intro Your local sticker shop has finally developed its own webpage. They do not have too much experience regarding web development, so they decided to develop...
Advent of Cyber - Day 10 Learning Objectives Understand how phishing attacks work Discover how macros in documents can be used and abused Learn how to carry out a phishing attack with a ...