Javascript: Don’t Hate, Deobfuscate

Javascript: Don’t Hate, Deobfuscate

Javascript: Don't Hate, Deobfuscate6August, 2022Days 38 - 40Javascript: Don't Hate, Deobfuscate100 Days of HackingPhoto creds goes ->> @felix_mittermeier It’s been my observance that if one’s a coder they either love Javascript or absolutely hate Javascript. If...

read more
Fuzzing with Ffuf – Part 2

Fuzzing with Ffuf – Part 2

Attacking Web Apps: Fuzzing with Ffuf - Part 2 24 July, 2022 Days 36 - 37 Fuzzing with Ffuf- Part 2 100 Days of Hacking In this article we’ll continue using Ffuf to attack a web application. We are still grinding along HTB’s Bug Bounty Job Role Path, Attacking Web...

read more
Attacking Web Apps: Fuzzing with Ffuf

Attacking Web Apps: Fuzzing with Ffuf

Attacking Web Apps: Fuzzing with Ffuf10July, 2022Days 30 - 35Attacking Web Apps: Fuzzing with Ffuf100 Days of HackingThis post will cover Fuzzing a web application. Fuzzing is fundamental when testing web applications. Tons of info, clues, assets can be discovered...

read more
Passive and Active Recon – Part 2

Passive and Active Recon – Part 2

Passive & Active Recon - Part 227June, 2022Days 26 - 29Passive & Active Recon: Part 2100 Days of HackingThis post will be brief and will make up Part 2 of Passive and Active Recon. We are still grinding along HTB’s Bug Bounty Job Role Path, Information...

read more
Passive and Active Recon

Passive and Active Recon

Passive & Active Recon21June, 2022Days 21 -25Passive & Active Recon100 Days of HackingThe next series of post are from the module Information Gathering - Web Edition, found within HTB's Bug Bounty Job Role Path. Specifically, this post will cover Passive and...

read more
Looking into Web Proxies

Looking into Web Proxies

Intercepting Web Requests Part 2:Web Proxies12June, 2022Days 12-20Web Proxies100 Days of HackingUltimately we'll be looking into Web Proxies as the main focus of this post. But first we'll look at Encoding/Decoding, Web & Zap Fuzzer, and Zap Scanner.  To...

read more
Intercepting Web Requests

Intercepting Web Requests

Intercepting Web Requests31MAY, 2022Days 8 -11Intercepting Web Requests100 Days of HackingOne of the things that a good vulnerability researcher, pen tester, or bug hunter will need is a solid grasp of tools used in the craft. While tools are plentiful, most are...

read more
WordPress Security Assessment

WordPress Security Assessment

BB JOB ROLE PATH - HTBWordPress Security AssessmentQuintius, Day 7 , 100 Days of Hacking22 March 2016Day 7 of the journey served to tie everything learned in Day 6 together. Still navigating my way down the Bug Bunty Job Path role, it’s now time to tackle the...

read more
Hacking WordPress 101

Hacking WordPress 101

Hacking WordPress 10125MAY, 2022Day 6Hacking WordPress 101100 Days of HackingInstead of moving linear through the Bug Bunty Path on HTB, I wanted to veer off path a sec and jump ahead to Hacking Wardress. With a user base that stretches as far and wide as WordPress...

read more
Analyzing Unknown Binaries- Dynamically

Analyzing Unknown Binaries- Dynamically

Analyzing Unknown Binaries- DynamicallyQuintius, Day 2, 100 Days of Hacking22 May 2022When I said this journey was not going to be linear in nature, Day 2 is an example of that. Although I’m writing this on Day 5, the events occurred on Day 2. My initial curiosity was...

read more

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This