
Penetration Testing
-
What I Do After the User Flag — My Beginner’s Priv Esc Flow
Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes — what I check, how I think, and why it still stumps me sometimes. -
Introduction to Shells — essential knowledge
Understand what shells really are, how they evolved, why they matter, and how different types like reverse shells and webshells work. -
Pentesting 101 – Command Injection & Shell Tricks (Session 1 – Part 2)
After exploring XSS in Part 1, we now dive into server-side command injection, shell behavior, piping, and classic reverse shell tactics. -
Basic Introduction to Penetration Testing – some basics & reflected XSS (Session 1 - Part 1)
Lab setup with Kali and Metasploitable 2, safe networking configuration, and a proper starting point for reflected XSS.