How I Manipulated A User’s Email: A CSRF PoC Walkthrough from TCM AcademyLearn how to exploit a CSRF vulnerability step-by-step with this Proof of Concept (PoC) walkthrough from TCM AcademyOct 1, 2024Oct 1, 2024
Creating a Cross-Site Scripting Worm: A SEED Lab ProjectUncover how XSS worms exploit web vulnerabilities and learn key prevention tips to boost your cybersecurity expertise.Sep 2, 2024Sep 2, 2024
That’s the Ticket: TryHackMe Write-UpDiscover how to exploit blind XSS in TryHackMe’s ‘That’s the Ticket’ challenge. Step-by-step guide to boost your hacking skills.Aug 27, 2024Aug 27, 2024
Stealing Admin Cookies: An XSS Challenge from TCM Security’s Practical Bug Bounty CourseLearn practical techniques, step-by-step methods, and security insights that will boost your bug hunting skills!Aug 23, 20242Aug 23, 20242
TryHackMe: Intro to Cross-Site ScriptingExplore Cross-Site Scripting(XSS) attacks with this TryHackMe room walkthrough.Aug 16, 2024Aug 16, 2024
TryHackMe: Injectics WalkthroughIn this writeup, I document my process and methodology for the TryHackMe Injectics room. This exercise shows how I used different injection…Aug 8, 20241Aug 8, 20241
Burp Suite Made Easy: A Step-By-Step Tutorial (Part 1 of 2)Learn Burp Suite basics: setup, configure FoxyProxy, add CA Certificate, and explore site mapping and endpoint validation.Jul 22, 2024Jul 22, 2024
Pimp My Kali: Trick Out Your Virtual Machine For Ultimate PerformanceHow To Set Up a Comprehensive Kali Linux Environment for Labs Using PimpmykaliJul 9, 2024Jul 9, 2024
Authentication Bypass with TryHackMeUnderstanding how to bypass authentication mechanisms is a critical aspect of penetration testing. This blog aims to educate and inform on…Jul 6, 2024Jul 6, 2024
Double Jeopardy: CDK Global’s Cybersecurity NightmareCDK Global, a leading software-as-a-service (SaaS) provider for car dealership operations, recently faced a significant cyber attack that…Jul 3, 2024Jul 3, 2024