
Conversor
Walkthrough of the Conversor machine – web app XSLT injection, credential cracking from SQLite, and sudo privilege escalation with needrestart.

Walkthrough of the Conversor machine – web app XSLT injection, credential cracking from SQLite, and sudo privilege escalation with needrestart.

A detailed walkthrough of the Expressway machine, covering IPsec enumeration, PSK hash cracking, and Sudo host-based privilege escalation.
Put your TShark skills into practice and analyse some network traffic.
Short summary of the post for previews and SEO.
First Chapter in bash scripting for Linux
Learn about secure network protocols at the different layers of the OSI model.
Learn techniques for securing and protecting network devices from potential threats and attacks.
A comprehensive guide to exploiting Gila CMS vulnerabilities and performing Linux privilege escalation through tar wildcard cron job exploitation.
Learn how to improve the security posture of your Linux systems.
Short summary of the post for previews and SEO.