PinnedPublished inPentester Academy BlogAccess On-Demand Bootcamp Recordings on Our Lab PlatformAnnual subscriptions now include select bootcamp recordings!Aug 19, 20214Aug 19, 20214
Published inPentester Academy BlogLab Walkthrough — Shockin’ Shells: ShellShock [CVE-2014–6271]Let’s learn about the (in)famous ShellShock vulnerability and how it was leveraged by the malicious actors!Apr 27, 2023Apr 27, 2023
Published inPentester Academy BlogLab Walkthrough — Authorization Bypass in RegexRequestMatcher [CVE-2022–22978]Let’s learn about a quick win trick to bypass authorization in vulnerable versions of Spring Security.Apr 20, 2023Apr 20, 2023
Published inPentester Academy BlogLab Walkthrough — Lucee Server Arbitrary File Write [CVE-2021–21307]This exercise is to understand how to exploit the Lucee server using the Metasploit Framework.Apr 13, 2023Apr 13, 2023
Published inPentester Academy BlogLab Walkthrough — LimeSurvey RCE [CVE-2021–44967]This exercise is to understand how to exploit the LimeSurvey application.Apr 5, 2023Apr 5, 2023
Published inPentester Academy BlogINE’s eJPT Certification is Here to Kickstart Junior Penetration Testing CareersWith INE’s release of the eJPT Certification, you can learn and demonstrate mastery of all the necessary skills for cybersecurity roles.Mar 29, 2023Mar 29, 2023
Published inPentester Academy BlogLab Walkthrough — Moodle SpellChecker Path Authenticated RCE [CVE-2021–21809]This exercise is to understand how to exploit the Moodle server using the Metasploit Framework.Mar 23, 2023Mar 23, 2023
Published inPentester Academy BlogLab Walkthrough — Drupalgeddon 2 [CVE-2018–7600]This exercise is to understand how to exploit the Drupal server using the Metasploit Framework and manually.Mar 16, 2023Mar 16, 2023
Published inPentester Academy BlogCyber Security Accessibility for Small BusinessesSmall businesses are most likely to suffer after cyber attacks. Learn how INE can help you develop the necessary skills to protect yourself.Mar 10, 20231Mar 10, 20231
Published inPentester Academy BlogLab Walkthrough — The WannaCry RansomwareUnderstand how the Wannacry ransomware works and how it encrypts all personal data on the Windows system. Learn to prevent such attacks.Feb 23, 20231Feb 23, 20231