PinnedPentester AcademyinPentester Academy BlogAccess On-Demand Bootcamp Recordings on Our Lab PlatformAnnual subscriptions now include select bootcamp recordings!4 min read·Aug 19, 2021--4--4
Pentester AcademyinPentester Academy BlogLab Walkthrough — Shockin’ Shells: ShellShock [CVE-2014–6271]Let’s learn about the (in)famous ShellShock vulnerability and how it was leveraged by the malicious actors!13 min read·Apr 27, 2023----
Pentester AcademyinPentester Academy BlogLab Walkthrough — Authorization Bypass in RegexRequestMatcher [CVE-2022–22978]Let’s learn about a quick win trick to bypass authorization in vulnerable versions of Spring Security.5 min read·Apr 20, 2023----
Pentester AcademyinPentester Academy BlogLab Walkthrough — Lucee Server Arbitrary File Write [CVE-2021–21307]This exercise is to understand how to exploit the Lucee server using the Metasploit Framework.7 min read·Apr 13, 2023----
Pentester AcademyinPentester Academy BlogLab Walkthrough — LimeSurvey RCE [CVE-2021–44967]This exercise is to understand how to exploit the LimeSurvey application.7 min read·Apr 5, 2023----
Pentester AcademyinPentester Academy BlogINE’s eJPT Certification is Here to Kickstart Junior Penetration Testing CareersWith INE’s release of the eJPT Certification, you can learn and demonstrate mastery of all the necessary skills for cybersecurity roles.3 min read·Mar 29, 2023----
Pentester AcademyinPentester Academy BlogLab Walkthrough — Moodle SpellChecker Path Authenticated RCE [CVE-2021–21809]This exercise is to understand how to exploit the Moodle server using the Metasploit Framework.9 min read·Mar 23, 2023----
Pentester AcademyinPentester Academy BlogLab Walkthrough — Drupalgeddon 2 [CVE-2018–7600]This exercise is to understand how to exploit the Drupal server using the Metasploit Framework and manually.12 min read·Mar 16, 2023----
Pentester AcademyinPentester Academy BlogCyber Security Accessibility for Small BusinessesSmall businesses are most likely to suffer after cyber attacks. Learn how INE can help you develop the necessary skills to protect yourself.2 min read·Mar 10, 2023--1--1
Pentester AcademyinPentester Academy BlogLab Walkthrough — The WannaCry RansomwareUnderstand how the Wannacry ransomware works and how it encrypts all personal data on the Windows system. Learn to prevent such attacks.8 min read·Feb 23, 2023--1--1