⌨️
Penetration testing & ethical hacking concepts
CtrlK
  • Introduction
    • Resources
  • 💿Virtualbox network setup
    • What is VirtualBox?
    • NAT
    • NAT network
    • Bridged adapter
    • Internal network
    • pfSense
    • vboxmanage
    • Overview
  • 🕵️OSINT
    • What is OSINT?
    • Google dorks
    • Metadata
    • Social media
      • osintagram
  • Tools
    • waybackurls
    • recon-ng
    • sherlock
    • maltego
    • theHarvester
    • photon
    • spiderfoot
  • 😨Social Engineering
    • What is social engineering?
    • 7 tricks of social engineering
    • Email phishing
    • Typosquatting
    • Compiled resources
  • 😈MitM attack
    • What is MitM attack?
    • ARP spoof/poison
    • DNS spoof/poison
    • HTTP MitM attack
    • ICMP redirect attack
    • DHCP spoofing
    • Evil twin attack
    • Experiment (guest network)
    • Compiled resources
  • 🔌UPnP exploitation
    • What is UPnP?
    • What is SSDP?
    • IGD functions
    • LAN devices
    • Compiled resources
  • Network Reconnaissance & Attacks
    • What is network recon & attacks?
  • 1️⃣ Network live host discovery
    • What is network live host discovery?
    • nmap
    • arp-scan
    • masscan
  • 2️⃣ Network port scan/services enumeration
    • What is network port scan/services enumeration?
    • nmap
    • netcat
  • 3️⃣ Network services vulnerability scanning & exploitation
    • What is network vulnerability scanning/exploitation?
    • 20/21 ~ FTP
    • 22 ~ SSH
    • 25 ~ SMTP
    • 53 ~ DNS
    • 80/443 ~ HTTP/HTTPS
    • 88 ~ Kerberos
    • 110 ~ POP3
    • 111/2049 ~ RPC/NFS
    • 139/445 ~ SMB
    • 143 ~ IMAP
    • 3389 ~ RDP
  • Vulnerability & exploitation
    • Database
    • Metasploit
      • Meterpreter
    • Msfvenom
    • Binary Exploitation
      • Computer architecture
        • Instruction Set Architecture (ISA)
          • x86 (32-bit)
          • x64 (64-bit)
          • ARM32
          • ARM64/AArch64
        • Memory Organization
          • General memory layout
        • System-Level Architecture
          • User vs Kernel space
      • Buffer Overflow
        • x86 (32-bit)
      • Tools
        • gdb, mona, ghidra, ...
  • Misconfigurations
    • .DS_Store
  • Web Application Penetration Testing
    • Introduction
    • Injection attacks
      • SSTI
      • SQL injection
        • Filter evasion techniques
        • Practical challenge examples
          • TryHackMe
            • Burp suite: Repeater room
            • Advanced SQL Injection
    • Server-Side attacks
      • Server-side Request Forgery (SSRF)
      • File inclusion & Path traversal
        • PHP wrappers
      • Insecure Direct Object Reference (IDOR)
      • Upload vulnerabilities
        • File extension cheat-sheet
      • Insecure deserialization
        • PHP magic methods
        • Tools
      • Prototype pollution
    • Client-Side attacks
      • CSRF
      • CORS & SOP
      • CORS vs CSRF
      • Cross-site scripting (XSS)
    • HTTP Request Smuggling
      • HTTP
      • HTTP/2
    • Web Content Discovery
      • Directories/URLs gathering
      • Subdomain enumeration
  • Authentication/session management
    • OWASP WSTG-SESS-10 ~ JSON Web Token (JWT)
    • OWASP WSTG-ATHZ-05 ~ OAuth weaknesses
  • Webshell
  • Web API pentesting
    • Resources
    • Methodology
    • jq
    • httpx
    • ParamSpider
  • Web app pentesting methodology
  • OWASP
    • OWASP top 10 2021
    • OWASP API top 10 2023
    • Web Security Testing Guide (WSTG)
      • WSTG-ATHZ
        • WSTG-ATHZ-05 ~ OAuth weaknesses
      • WSTG-SESS
        • WSTG-SESS-10 ~ JWT
  • General web knowledge
    • URI standard (RFC 3986)
    • HTTP headers
      • Exploitable headers
      • Request Smuggling
  • 🛣️Attacks on routing protocols
    • What are attacks on routing protocols?
    • BGP hijacking
  • 🏕️To explore
    • MQTT
    • Routersploit
    • DNS rebinding attack
    • LLMNR/mDNS poisoning
  • 👤Anonymity
    • VPN
    • Proxychains
    • TOR
    • Obfuscation
  • Credentials brute-force/cracking
    • Introduction
    • Windows SAM database
    • Dictionary attack
    • Rainbow attack
      • Hash database
    • Tools
      • Hydra
      • John the ripper
      • Hashcat
      • hash-identifier
  • Post-exploitation
    • Gaining shell
      • netcat
      • socat
      • powershell
      • bash
      • PHP
    • Repository
  • Privilege escalation
    • Linux
      • Repositories
      • Enumeration
      • Vulnerabilities exploit
        • General
        • Kernel exploit
        • Sudo
        • SUID
        • Capabilities
        • Cronjobs
        • $PATH
        • NFS (target-machine)
        • Filesystem sharing
          • NFS (attacker-machine)
    • Windows
      • Password harvesting
      • Vulnerabilities exploit
        • Scheduled tasks
        • AlwaysInstallElevated
        • Service misconfigurations
          • Insecure permissions on service executable
          • Unquoted service path
          • Insecure service permission
        • Abusing privileges
  • Ⓜ️MITRE ATT&CK
    • Introduction
    • OS Credential Dumping (T1003)
      • LSASS memory (T1003.001)
  • 🧰Tools/services
    • Introduction
    • Web application pentesting
      • Web discovery/fuzzing
        • paramspider
        • arjun
        • katana
      • dirsearch
      • uro
      • Password brute-forcing
      • Burp Suite (Community)
      • scanners
        • ZAP (Zed Attack Proxy)
        • nikto
        • nuclei
    • Information gathering/reconnaissance
    • Network recon & attacks
      • nmap (general overview)
      • scapy
      • bettercap
    • General
      • impacket
    • Wordlists
      • cewl
  • Professional report writing
    • Report template
      • Web applicaton pentesting
        • OWASP report layout
  • Tasks on-the-go
    • Note taking on-the-go
    • Other tips
  • Practice
    • Web Application Pentesting
      • OWASP
        • OWASP Juice Shop
        • OWASP Mutillidae II
        • OWASP Hackademic
      • Vulnhub
        • ...
      • Damn Vulnerable Web Application (DVWA)
    • Metasploitable 2
  • Forensics
    • Steganography
      • Resources
      • Tools
        • xxd, hexdump
        • strings
        • binwalk
        • exiftool
        • stegcracker
  • Operational Security (OpSec)
    • Hardening
      • General
      • Oracle VirtualBox
      • Web Browser
      • VPN/Proxy
  • Safe document viewer
    • PDF
    • .docx
  • Write-ups
    • TryHackMe
      • Silver Platter
      • Light
      • Pickle Rick
      • Hammer
        • Enumeration (active recon)
          • /hmr
          • Further directory discovery
          • /phpmyadmin
          • burp suite sitemap
        • Brute forcing 4-digit code
        • Retrieving the flag
      • OWASP Top 10 - 2021 (task 22)
      • sqlmap
      • Injectics
      • Include
        • Initial enumeration
        • Express app (port 4000)
          • SSRF vulnerability
        • Apache web server (port 50000)
          • LFI + path traversal
        • Further learning
          • Other access methods
          • Gaining remote shell with LFI2RCE
          • Inspecting Express app source code
    • OverTheWire
      • Untitled
    • OWASP
      • OWASP Juice Shop
      • OWASP WebGoat
  • AI prompt
    • ChatGPT
  • Windows Active Directory
    • Introduction
      • Resources
    • Initial Access
      • Authentication
        • NetNTLM
      • Others
    • Enumeration
      • runas.exe
      • Microsoft Management Console (MMC)
      • Command Prompt (cmd)
      • Powershell
        • Active Directory Module
        • Powerview
        • ObjectClass
      • Bloodhound
        • Data collectors
          • Sharphound
        • Cypher
          • Useful queries
        • Icon mapping
    • Lateral movement & Pivoting
      • Example scenario
      • Spawning remote processes
        • Psexec
        • WinRM
        • sc.exe
        • schtasks
        • Example
      • Windows Management Instrumentation (WMI)
        • Example
      • Leveraging alternate authentication materials
        • Pass-the-Hash (NTLM)
        • Pass-the-Ticket (Kerberos)
        • Pass-the-Key/Overpass-the-Hash (Kerberos)
      • Abusing user behavior
        • Abusing writable shares
        • RDP hijacking
    • Exploitation techniques
      • Permission delegation
      • Kerberos delegation
      • Exploiting authentication relay ~ Print Spooler Service
      • Group Policy Objects (GPOs)
      • Exploiting Certificates
      • Exploiting domain trusts
      • Kerberoasting (TGS-REP roasting)
      • AS-REP roasting
    • Credentials harvesting
      • PowerShell history
      • Registry Hives
      • Volume Shadow Copy Service
      • Local Security Authority Subsystem Service (LSASS)
    • General
      • Golden Ticket
        • Inter-Realm TGT
    • Tools
      • Responder
      • mimikatz
        • sekurlsa::pth
      • kekeo/rubeus
      • TO explore
        • enum4linux
        • crackmapexec
        • impacket
          • smbexec
        • ldapsearch
        • rpcclient
    • Experimentations
      • Reverse shell
Powered by GitBook
On this page
  1. Web Application Penetration Testing
  2. Injection attacks
  3. SQL injection
  4. Practical challenge examples

TryHackMe

  1. Injectics

LogoGitBookapp.gitbook.com
PreviousPractical challenge examplesNextBurp suite: Repeater room

Last updated 3 months ago