Bug Bounty Hunting & Ethical Hacking

TryHackMe Brooklyn Nine Nine Walkthrough

TryHackMe Brooklyn Nine Nine Walkthrough

TryHackMe Brooklyn Nine Nine walkthrough will guide you through another themed room of THM. This one is based on the Brooklyn Nine-Nine TV series, If you’ve liked other THM rooms, such as Pickle Rick, or Kenobi, you will surely love this one. Let’s get straight to the action. The first step would be to deploy …

Read more

How to Use Searchsploit in Kali Linux?

How to Use Searchsploit in Kali Linux

If you are into penetration testing there is a chance you are familiar with a website called Exploit-DB. Even though it is not the only option, it is one of the most used websites for checking if a specific version of aservice is vulnerable. Exploit-DB is created by Offensive Security. The website is pretty neat, …

Read more

TryHackMe Kenobi Walkthrough

Tryhackme Kenobi walktrough

Kenobi is another great room to improve your penetration testing skills. If you had liked the Pickle Rick room of the Tryhackme, there is a chance you will also like the Tryhackme Kenobi room. This room is named in honor of Obi-Wan Kenobi, a Star Wars character. A smart way to learn is to try …

Read more

TryHackMe Pickle Rick Walkthrough

Tryhackme Pickle Rick walkthrough

This is one of the most interesting beginner-friendly level rooms on Try Hack Me. If you are familiar with the Rick and Morty, well, this room is based on them – you have to help Morty find the 3 ingredients that will help Rick make a potion that will transform him from the pickle back …

Read more

TryHackMe Vulnversity Walkthrough

Vulnversity walkthrough

Welcome to the Tryhackme write-up series. Today we going to analyze a room that should be one of the first ones for everyone that starts a journey on Try Hack Me. The room is called Vulnversity. This room focuses on active reconnaissance and the main tools for it, it has tasks related to web application …

Read more

OWASP Membership – Is It Worth It?

OWASP membership is it worth it

Probably majority of the cybersecurity (and development) specialists, know about the OWASP organization. Being out there for a long time, Open Web Application Security Project became a synonym for various security practices and vulnerable applications. As the OWASP is non-profit organization, most of the projects are led by the community. And the main brainpower behind …

Read more

Sublist3r – Tool for Enumerating Subdomains

Sublist3r is one of the most widely used tools for enumerating subdomains. A Python based script that uses OSINT, can help you to identify every subdomain of the target. At the moment of publishing this article, Sublist3r has almost 6000 stars on GitHub. This shows that the tool is pretty popular and is one of …

Read more