HTB

HackTheBox - Poison

Linux machine medium level

HackTheBox - Valentine

Linux machine easy level

HackTheBox - Shocker

Linux machine easy level

HackTheBox - Poison

Linux machine easy level

HackTheBox - Knife

Linux machine easy level

HackTheBox - Ready

Linux machine medium level

HackTheBox - Cap

Linux machine easy level

Bug Bounty

Bug Bounty

Some Resources to apply in a bugbounty

Active Directory

Attack Active Directory

On this machine we compromised an Active Directory domain.

Wifi

Hacking Wifi (cracking Handshake)

Cracking the Handshake

CTF

The vulnerability that opened the door

CTF challenge about a system intrusion

Web

JWT Attacks

JSON Web Tokens (JWT) are a format for sending cryptographically signed JSON data between systems. In theory, they can contain any type of data, but are most commonly used for...

Insecure CORS Policy

Cross-Origin Resource Sharing (CORS) is a browser mechanism that allows controlled access to resources outside a given domain. It extends and adds flexibility to the same-origin policy (SOP). However, it...

CSRF Attacks

CSRF attacks (Cross-site request forgery) is a type of malicious exploit that aims to perform unauthorized operations that will be executed by a user that the website trusts.

XXE Attacks

XXE (XML External Entity) attacks are vulnerabilities that arise in applications that parse XML input. Thanks to this an attacker could alter the XML data in the request to execute...

Devops

How to install Kubernetes

Kubernetes is an open source software developed to manage and automate the operation of container virtualisation tools.