In this post, we will demonstrate how to set up a vulnerable WordPress CMS for penetration testing on Ubuntu 20.04, using Docker and XAMPP on
Today we are going to solve another boot2root challenge called “CyberSploit: 1”. It’s available at Vulnhub for penetration testing. This is an easy level lab.
Today we are going to solve another boot2root challenge called “Sunset: decoy”. It’s available at Vulnhub for penetration testing. This is easy for the intermediate
Today we are going to solve another boot2root challenge called “eLection: 1”. It’s available at Vulnhub for penetration testing. This is a mid-level lab based
Isn’t it great if you get the privilege to run any system commands directly on the target’s server through its hosted web-application? Or you can
In this article, we will learn how we can Examine Corrupted File Extension to identify the basic file header in a Forensic Investigation. Let’s understand
In this article, we will run a couple of CLI commands that help a forensic investigator to gather volatile data from the system as much
Grabbing a banner is the first and apparently the most important phase in both the offensive and defensive penetration testing environments. In this article, we’ll
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “Tre:1”. It is made by SunCSR team difficulty level