New: offensive-securityAll contenthive-129948hive-196917krzzanhive-150122hive-180932photographysteemhive-183959hive-185836hive-166405hive-144064hive-188619hive-183397uncommonlabhive-101145hive-145157hive-184714hive-103599hive-165987hive-154900hive-109690hive-181136hive-150943lifeTrendingNewHotLikerscristi (70)in cybersecurity • 7 years agoJIS-CTF Walkthrough - Yet Another Cybersecurity VideoIn this video I demonstrate how to get into a webserver through an unsanitized file upload functionality. First, we're dealing with a server for which the access to the administrator panel is…cristi (70)in programming • 7 years agoDisassembling Binaries with IDA - [A Reverse Engineering Tutorial]In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able to…cristi (70)in offensive-security • 7 years agoA Collection of Vulnerable Machines for Penetration Testing and Offensive Security - [Vulnhub]If you're into offensive security, one of the best places to safely practice your craft is Vulnhub , which is a collection of virtual machines which are vulnerable by design. What do I mean by…