Trixia HornerCreating a Cross-Site Scripting Worm: A SEED Lab ProjectUncover how XSS worms exploit web vulnerabilities and learn key prevention tips to boost your cybersecurity expertise.Sep 2Sep 2
Trixia HornerThat’s the Ticket: TryHackMe Write-UpDiscover how to exploit blind XSS in TryHackMe’s ‘That’s the Ticket’ challenge. Step-by-step guide to boost your hacking skills.Aug 27Aug 27
Trixia HornerStealing Admin Cookies: An XSS Challenge from TCM Security’s Practical Bug Bounty CourseLearn practical techniques, step-by-step methods, and security insights that will boost your bug hunting skills!Aug 23Aug 23
Trixia HornerTryHackMe: Intro to Cross-Site ScriptingExplore Cross-Site Scripting(XSS) attacks with this TryHackMe room walkthrough.Aug 16Aug 16
Trixia HornerTryHackMe: Injectics WalkthroughIn this writeup, I document my process and methodology for the TryHackMe Injectics room. This exercise shows how I used different injection…Aug 8Aug 8
Trixia HornerBurp Suite Made Easy: A Step-By-Step Tutorial (Part 1 of 2)Learn Burp Suite basics: setup, configure FoxyProxy, add CA Certificate, and explore site mapping and endpoint validation.Jul 22Jul 22
Trixia HornerPimp My Kali: Trick Out Your Virtual Machine For Ultimate PerformanceHow To Set Up a Comprehensive Kali Linux Environment for Labs Using PimpmykaliJul 9Jul 9
Trixia HornerAuthentication Bypass with TryHackMeUnderstanding how to bypass authentication mechanisms is a critical aspect of penetration testing. This blog aims to educate and inform on…Jul 6Jul 6
Trixia HornerDouble Jeopardy: CDK Global’s Cybersecurity NightmareCDK Global, a leading software-as-a-service (SaaS) provider for car dealership operations, recently faced a significant cyber attack that…Jul 3Jul 3
Trixia HornerThe Hidden Agenda: When Ransomware is Not the EndgameIn the epic battle of cyber warfare, ransomware isn’t the endgame — it’s just the beginning.Jun 27Jun 27