File Inclusion
Learn about file inclusion vulnerabilities in web applications, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal. Understand how attackers exploit these fl...
Learn about file inclusion vulnerabilities in web applications, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal. Understand how attackers exploit these fl...
Learn about common file upload vulnerabilities in web applications, how attackers exploit them to execute malicious code or bypass restrictions, and how to prevent such attacks. Based on the TryHac...
Learn about command injection vulnerabilities, how attackers exploit them to execute system commands through insecure applications, and strategies for prevention. Based on the TryHackMe Command Inj...
Learn the differences between reverse, bind, and web shells. Explore how shells work and how attackers use them to gain remote access. Based on the TryHackMe Shells Overview room.
Introduction to Gobuster, an offensive security tool used for enumeration.
Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials. From THM.
OWASP Top 10-2021 from TryHackMe
Burp Suite from TryHackMe
Security and Pentest Home Lab Environment
Security and Pentest Home Lab Environment