Lessons

The following lessons explain different programming concepts and have been published by our members. Search for a particular lesson using the filters

Elevation - Rising from the Mud

Gaining access to a system is just the beginning. The real conquest starts with privilege escalation. In this lesson, you'll learn to identify misconfigurations, abuse SUID binaries and poorly configured sudo, and how to move laterally between users to dominate the system.

Maintaining Access Obtained in the Target System during pentesting post exploitation

Learn effective techniques and tools for maintaining persistent access during penetration testing. Discover methods such as creating additional user accounts, installing backdoors, using persistent malware, scheduling tasks, and leveraging covert channels to ensure long-term access. Understand ethical practices and tools like PowerShell Empire, Covenant, and more for efficient post-exploitation.

What is Nmap and how to use it

Discover Nmap, the ultimate tool for port scanning and network mapping! This powerful software helps identify hosts, services, and potential vulnerabilities in your network, making it essential for penetration testing. With user-friendly commands and advanced scripting capabilities, Nmap is a game-changer for cybersecurity enthusiasts.

Network Reference Models

Decoding Networks: OSI's 7 layers & TCP/IP's 4 layers. Unveil network language for troubleshooting & secure design.

Exploring Windows from the Outside - SMB, WinRM, and Other Backdoors

Learn how to identify exposed services in Windows environments and discover how tools like smbclient and evil-winrm can reveal more than you might expect. A practical guide to exploring systems from the outside, without breaking anything… yet.

Vulnerable Databases and the Secrets That Shouldn't Be There

Learn how a poorly constructed query can open the doors to a database. Discover the secrets hidden in images, the power of steganography, and brute force against hashes. Because in cybersecurity, the invisible can also be vulnerable.

Welcome to the First Day of the Rest of Your Life

This is the beginning of a transformative journey. Take on the 30-day challenge to become a hacker: break mental systems, learn technical hacking, join a committed community, and defeat the impostor within you. You’ll never see the web the same way again.

SQL Injection and Password Cracking - Technical and Ethical Guide

Sometimes, a single quote is enough to bring down a system. In this practical and responsible guide, you'll learn how SQL injection is exploited and how to crack passwords via hashes, using tools like SQLMap, John the Ripper, and Hashcat. Because understanding vulnerabilities is the first step to protecting them.

Network Scanning during Pen-testing

Discover essential network scanning techniques to identify active devices and vulnerabilities during your pen-testing phases.

Nessus

Discover the essential techniques for using the Nessus scanner to protect your organization's assets through automated vulnerability scanning.

Introduction to Content Creation with AI Generative Models and Prompting

Learn how to create high-quality content with AI generative models and optimize your results with prompting techniques.

The Wound in the System - The Legacy of EternalBlue

Discover the technical and human story behind EternalBlue, the vulnerability that marked a turning point in cybersecurity. From the NSA to WannaCry, explore how an ignored flaw unleashed global chaos.

Nothing Is Truly Hidden - HTML, HTTP, and the Human Trail

Learn to see what others don't. Discover how to inspect source code, understand HTTP/HTTPS protocols, and use tools like WhatWeb to detect web technologies and the human traces behind every page.

Use of Port Scanning Tools and Services for pentesting

Discover the Best Port Scanning Tools and Techniques to Identify Open Ports, Services, and Potential Vulnerabilities.

Comprehensive Guide to IPTables

Master IPTables and Protect Your Network with Advanced Firewall Techniques

Identify Vulnerable Systems and Services during pentesting

Unlock the secrets of cybersecurity with our lesson on identifying vulnerable systems and services! Learn essential techniques for penetration testing, including port scanning, service identification, and vulnerability analysis. Equip yourself with the skills to protect businesses and society from cyber threats. Join us today!

Enterprise Network Architecture

Crafting Optimal Enterprise Network Architectures: Balancing Performance, Security, and Scalability for Seamless Operations and Growth.

Introduction to AI for Professionals

Learn how to use AI to streamline your workflow, boost your productivity, and achieve more in less time.

Enumeration, Hashes, and John - A Journey Through the Cracks in the System

Explore the world of Broken Access Control, hidden path enumeration, and password cracking with tools like John the Ripper and Hashcat. A technical and reflective journey through human and digital vulnerabilities.

Kali Linux - The Hacker's Gateway

Kali Linux is not just an operating system: it's a threshold to knowledge, deep analysis, and technical understanding. Learn about network protocols, scanning with Nmap, brute-force attacks, FTP, SSH, and more. This article is your first step on the path of the ethical hacker.

Load more...