🍀 Want to try your luck at our claw machine at leHACK? Take part in the #PandemicCTF designed by our tech ambassador BitK, taking place today and tomorrow! 🦠 You'll not only have the chance to win one of our many goodies, but also to compete for the top 3 prizes: 1️⃣ A one-year licence for Burp Suite 2️⃣ A Flipper Zero, the geek's multi-tool device 3️⃣ "Javascript for hackers: Learn to think like a hacker" by Gareth Heyes Good luck! #YesWeRHackers #leHACK2024
YesWeHack’s Post
More Relevant Posts
-
of course
All hackers invited to participate in Lazy programmer crazy challenges 🥳😂 👉 register now https://lnkd.in/dn_tvsQn #hackathon
To view or add a comment, sign in
-
-
Vulnversity - I have just completed this room! Check it out: https://lnkd.in/gnPpcCVF #tryhackme #recon #privesc #webappsec #video #vulnversity via TryHackMe
To view or add a comment, sign in
-
Authentication Bypass -Username enumeration -Brute Force -Logic Flaw -Cookie Tampering
TryHackMe
tryhackme.com
To view or add a comment, sign in
-
Security Researcher | Diplom-Jurist (Univ., GER) | Assessor (§ 61 JAG NRW, GER) | Top 1% (TryHackMe)
I just solved the "Pickle Rick" room on @tryhackme and learned about the options, the sudo command offers. Like "sudo -l" to show a list for the he allowed (and forbidden) commands for the invoking user. #sudoOffersOptions #webServerExploit #ctf https://lnkd.in/e5y9bm8i
TryHackMe | Pickle Rick
tryhackme.com
To view or add a comment, sign in
-
Vulnversity - I have just completed this room! Check it out: https://lnkd.in/dDxyXAsP #tryhackme #recon #privesc #webappsec #video #vulnversity via TryHackMe
TryHackMe | Vulnversity
tryhackme.com
To view or add a comment, sign in
-
Done with few more JWT Attack labs from PortSwigger WebSec Academy. Learnt about the different forms of header injections. Still left with one more i.e. using the 'kid' header. Will finish off with that soon as well. #WebExploitation
To view or add a comment, sign in
-
-
In this video, I work through the "Expose" machine on TryHackMe and successfully elevate my privileges to root and capture the final flag! As usual, I did not prep this ahead of time; this is me working through the machine live. I demonstrate the following: - Enumerating FTP, MQTT, and HTTP - Intercepting requests with Caido - Bypassing file upload restrictions - Using PHP for reverse shells - Privilege escalation by abusing SUID Enjoy! (If the video isn't in HD when you watch it, it's still processing. It will be full HD shortly 🙂)
Expose [Walkthrough] -- TryHackMe LIVE!
https://www.youtube.com/
To view or add a comment, sign in
-
Completed the Rick and Morty CTF 🛡️ - Pickle Rick Challenge 🥒👩💻 by TryHackMe 🚀 . Requires you to exploit a webserver to find 3 ingredients that will help Rick make his potion to transform himself back into a human from a pickle🕵️♂️. 🔗https://lnkd.in/gdWnhKeP #TryHackMe #PickleRick
TryHackMe | Pickle Rick
tryhackme.com
To view or add a comment, sign in
-
Security+, CCNA, CCNP Security, CCNP R&S, eJPT, eCPPT, JNCIA-SEC, Red team, Penetration Tester, Cyber Security, CTF Player, Network Security, Cloud Computing, AWS, solutions architect associate, Junos (JNCIA-Junos)
Vulnversity - I have just completed this room! Check it out: https://lnkd.in/dtwjwin8 #tryhackme #recon #privesc #webappsec #video #vulnversity via @realtryhackme
TryHackMe | Vulnversity
tryhackme.com
To view or add a comment, sign in
-
ATTENTION: Challenge #10 is released! Your mission, should you choose to accept it, is to inject an alert message ('Wizer'), in order to win the flag. Give it a try it's fun and gratifying, and will make you a better coder! https://lnkd.in/eqkB6sud As always, we've also released a short writeup of the oldest active challenge as it retires, this time it's tricky CTF #4: https://lnkd.in/eHP7PfFV. #securecoding #developercommunity #appsecurity #capturetheflag Code Wizer!
To view or add a comment, sign in
-
Future student at school 2600 seeking a 3-year apprenticeship in cybersecurity | Top 5% TryHackMe | eJPT in progress
1moHey, at least i got to have the socks 😄 Thank you.