Ali S. | Ms c Cyber Security | CEHCyber Attack Trends in 2024 (Predictive Analysis)IntroductionJan 8Jan 8
Ali S. | Ms c Cyber Security | CEHFile Upload Attacks// HTB AcademyWhen a web server permits users to upload files to its filesystem without appropriately checking things like their name, type, contents, or…Sep 12, 20231Sep 12, 20231
Ali S. | Ms c Cyber Security | CEHHTB Academy-Web Requests-CRUD APIIn this part we will engage with CRUD API which allows us to manipulate the ingredients of web page by using four essential operations…Sep 12, 2023Sep 12, 2023
Ali S. | Ms c Cyber Security | CEHHTB ACademy HTTP HeadersThis section of module consists information about types of request and response headers. Headers may be classified as follows:Sep 11, 2023Sep 11, 2023
Ali S. | Ms c Cyber Security | CEHHTB Academy HTTP Requests and Responses /Question 2–3In this section, we will be tested dynamics of HTTP request and response, usage of “curl” command in order to obtain information from…Sep 11, 2023Sep 11, 2023
Ali S. | Ms c Cyber Security | CEHHTB Academy Web Requests/Module:3 HyperText Transfer ProtocolThe third module of Bug Bounty Learning Path of Hack The Box Academy is Web Requests part. The aim of this module is teaching fundemantals…Sep 9, 2023Sep 9, 2023