Yulia PopovIntro to Log Analysis — TryHackMeIn this lab, we will explore concepts related to log analysis methodology, effective logging practices, and common tools to aid detection…4d ago4d ago
Yulia PopovLog Operations — TryHackMeIn this lab, you will learn the configuration approaches required to manage and analyse logs in an operational contextAug 14Aug 14
Yulia PopovIntro to Logs — TryHackMeThis lab covers how logs can be used to record an adversary’s actions, the tools and techniques needed to perform log analysis, and the…Aug 13Aug 13
Yulia PopovCSRF where token is not tied to user session — PortSwiggerThis lab’s email change functionality is vulnerable to CSRF.Jul 31Jul 31
Yulia PopovCSRF where token validation depends on token being present — PostSwiggerThis lab’s email change functionality is vulnerable to CSRF.Jul 25Jul 25
Yulia PopovCSRF where token validation depends on request method — PortSwiggerThis lab’s email change functionality is vulnerable to CSRF.Jul 25Jul 25
Yulia PopovCSRF vulnerability with no defenses — PortSwiggerThis lab’s email change functionality is vulnerable to CSRF.Jul 21Jul 21
Yulia PopovRemote code execution via web shell upload — PortSwiggerThis lab contains a vulnerable image upload function. It doesn’t perform any validation on the files users upload before storing them on…Jul 20Jul 20
Yulia PopovSSRF with whitelist-based input filter — PortSwiggerThis lab has a stock check feature which fetches data from an internal system.Jul 18Jul 18
Yulia PopovSSRF with blacklist-based input filter — PortSwiggerThis lab has a stock check feature which fetches data from an internal system.Jul 17Jul 17