Articles by Tag #pentest

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Linux Filesystem Hierarchy

Navigating Linux for the first time can feel overwhelming: where do files go, what do all those...

Learn More 1 0Nov 1 '25

Cracking the Shell: Enumerating SMB and SSH in the INE Skill Check Lab

Hello or welcome back, depending on whether you read my past article. This one will detail another...

Learn More 0 0Jan 4

HackTeam.RED: From API Keys to Full Infrastructure Compromise

🚀 HackTeam.RED: From API Keys to Full Infrastructure Compromise Professional Penetration...

Learn More 21 12Aug 26 '25

Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Explaining penetration testing methodologies for Kubernetes environments. Visualizing RBAC abuse after Legacy Token deprecation, attacks evading VAP, and the latest trends in container escape using Mermaid diagrams.

Learn More 0 0Jan 30

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

1. Introduction & Target Overview Targeted in this engagement was a web application...

Learn More 0 0Aug 21 '25

The Art of Recon: What Happens When a Target Only Has One Door?

1. Introduction: The Importance of Reconnaissance A penetration tester must respond to the...

Learn More 0 0Aug 22 '25

Git Tales: Secrets in the Shadows

Part 1 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...

Learn More 2 0Apr 29 '25

🚀 AstralGuard Cyber Night Talk: Exploring the Future of AI & Cybersecurity 🛡️🤖

AstralGuard Cyber Academy invites cybersecurity professionals, beginners, and enthusiasts to an...

Learn More 0 0Nov 27 '25

Git Tales: Part 2 - Demons in the Cloud

Part 2 of 3 in Git Tales Series Enter fullscreen mode Exit fullscreen mode ...

Learn More 3 0May 9 '25

Hack The Box - Redeemer (Redis)

I will cover solution steps of the "Redeemer" machine, which is part of the 'Starting Point' labs and...

Learn More 2 0Sep 1 '25

Criando um Port Scan com Python3

Introdução No artigo de hoje, vamos desenvolver um Port Scan utilizando Python 3, mas,...

Learn More 1 0Apr 29 '25

How i Became a Pentester | Como me Tornei um Pentester

🇬🇧 - Hello, nice to meet you, my name is Gustavo and I’m a Pentester for about one and a half years,...

Learn More 1 0Apr 29 '25

Пентестинг: основы, преимущества и применение

Пентестинг представляет собой комплексное тестирование, в ходе которого специалисты атакуют системы...

Learn More 1 0Jul 1 '25

🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know

APIs are the unsung heroes of modern apps—but they also open doors to attackers. Whether you’re...

Learn More 0 0Apr 10 '25

Next.js Middleware Broken Access Controls

Recently, an Authorization Bypass vulnerability was discovered in the Next.js framework (one of the...

Learn More 1 0Mar 27 '25

2FA Bypass via Response Manipulation

You know that vulnerability that says "the developer must have the intention to collaborate with an...

Learn More 1 0Feb 24 '25

Understanding a Netcat-Based Reverse Shell Using FIFO

One-liners like the following are often used in offensive security contexts to establish shell access...

Learn More 0 0May 3 '25

Инструменты пентестера: nmap, sqlmap, netcat – Исследование, Эксплуатация, Взаимодействие

Профессия пентестера (тестировщика на проникновение) требует не только глубоких знаний сетевых...

Learn More 0 0Jul 15 '25

Web Cache Deception Attacks

Web Cache Deception is a vulnerability first described in 2017. It occurs when a caching system —...

Learn More 0 0May 9 '25

Attacking WebDAV Protocol

WebDAV (Web-based Distributed Authority Version) is a legacy protocol that can be defined as an...

Learn More 0 0Mar 9 '25

[REPOST] Installing Genymotion for Android App Pentesting: The Definitive Guide

With the growing use of mobile applications, the security of these applications has become a key...

Learn More 0 0May 2 '25

Basics of Pentest on AWS Environment

Basics of Pentest on an AWS Environment Preparation and Authorization a. Obtain...

Learn More 0 0Mar 24 '25

Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Public-facing apps like React, Flutter, or plain JavaScript often make a critical OAuth mistake: they...

Learn More 0 0Jul 2 '25

Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]

🛠 Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]: 💡 Question: Run some of the...

Learn More 0 0Jul 30 '25

Mastering Cybersecurity: A Guide to Pentest+, CySA+, and SecurityX Certifications

Introduction As cyber threats continue to evolve, organizations require skilled...

Learn More 0 0Mar 27 '25

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Before we start , just quick reminder it’s Threat Modeling not Modelling. Now let recall basic...

Learn More 0 0Feb 13 '25

Hacking Hidden Paths with ffuf - Web Fuzzing Made Simple

A couple of weeks ago, someone emailed me some personal files and videos I have forgotten I have left...

Learn More 0 0Aug 20 '25

Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]

🛠 Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu] 💡 Question: Run some of the...

Learn More 0 0Jul 30 '25

Getting Started - Web Enumeration Walkthrough (Hack The Box)

🛠 Getting Started - Web Enumeration Walkthrough (Hack The Box): > 💡 Question: Run some...

Learn More 0 0Jul 30 '25

MCP + VS Code: Assisted pentest on an HTB box — from install to first flag

TL;DR: In this tutorial you will install Kali + MCP from scratch, connect VS Code as an MCP client,...

Learn More 0 0Aug 14 '25