remote-code-execution
From LFI to RCE: Exploiting File Inclusion Like a Pro
A hands-on deep dive into exploiting file inclusion vulnerabilities; from simple LFI to full RCE using session poisoning, log injection, and PHP wrappers.
shell
An Introduction to Shells: Essentials Knowledge
Understand what shells really are, how they evolved, why they matter, and how different types like reverse shells and webshells work.
university
Pentesting 101 – Command Injection & Shell Tricks (Session 1 – Part 2)
After exploring XSS in Part 1, we now dive into server-side command injection, shell behavior, piping, and classic reverse shell tactics.