Practice Pentesting

Lessons, exercises, and projects about pentesting

Browse our list of curated database of projects, exercises, and lessons to learn pentesting

Comprehensive Guide to IPTables

Master IPTables and Protect Your Network with Advanced Firewall Techniques

2hrs average

Buffer overflow exploit

Learn how to perform a buffer overflow exploit vulnerable from a Kali Linux machine.

Privilege Escalation Explained

Understanding Privilege Escalation: How Attackers Exploit Vulnerabilities to Gain Unauthorized Access

Broken Authentication: Understanding and Preventing a Critical Web Security Vulnerability

Learn about Broken Authentication, its impact on web security, and how to protect against this OWASP Top 10 vulnerability. Includes real-world examples and prevention techniques.

XSS (Cross-Site Scripting)

🔍 What is Cross-Site Scripting, examples and how to recreate the attack or prevent it on you web application

Communication of vulnerabilities found and mitigation recommendations

Identify vulnerabilities like lack of anti-CSRF tokens in HTML forms and learn effective solutions to mitigate CSRF attacks and enhance security.

Installation of Metasploitable 2

Learn how to install and use Metasploitable 2, a vulnerable virtual machine designed for practicing penetration testing and enhancing cybersecurity skills. This guide covers common vulnerabilities and installation prerequisites, offering detailed instructions for setting up Metasploitable 2 on VirtualBox.

Understanding Pentesting

Enhance Security with Realistic Assessments. Learn about types, objectives, and ethical considerations in cybersecurity testing.

Windows CMD Commands for Remote Hacking

Mastering Windows Command Line for Remote System Control

Understanding and Mitigating The Server Side Request Forgery Vulnerability

Learn about Server-Side Request Forgery (SSRF), its impact on web security, and how to protect against this dangerous vulnerability. Includes real-world examples and prevention techniques.

Broken Access Control: A Critical Web Security Vulnerability

Understanding and exploiting vulnerabilities in access control mechanisms

Mastering Web App Firewall Evasion: Techniques and Best Practices

Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.

How to create a pentesting report (with examples)

Documentation of activities performed during penetration testing: Key Steps for Detailed, Clear, and Effective Reporting

Pentesting Reconnaissance: Gathering information about the target

Mastering Information Gathering for Penetration Testing: Essential Techniques and Tools for Effective Reconnaissance

Wazuh: SIEM and EDR for Cybersecurity

Wazuh is an open-source security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. It offers threat prevention, detection, and response capabilities through its integrated modules.

Understanding Kernel Exploits

How Attackers Use Vulnerabilities to Gain System Control and Perform Privilege Escalation Attack

NoSQL Injection

Discover the Causes, Consequences, and Solutions of NoSQL Injection: A Comprehensive Guide to Preventing and Mitigating Vulnerabilities in NoSQL Databases

Understanding SQL Injection: The Second Most Critical OWASP Vulnerability

Learn everything about SQL Injection

Bypassing a firewall

How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**

Metasploit pentesting tool

What is Metasploit and how to use it for pentesting, key components and complementary tools