Learn how to detect a second-order SQL injection vulnerability using Burp Suite and custom sqlmap tamper scripts. Understand the limitations of automated scanne
This article details the process of recovering a password for a Windows 2008 target machine using network scanning and Metasploit. It covers steps such as IP di
Discover how the CVE-2019-11043 vulnerability can be exploited to remotely execute code on Nginx PHP-FPM servers. Learn about affected versions and detailed exp
Discover the details and PoC code for CVE-2018-14847, a remote code execution vulnerability in MikroTik RouterOS. Learn how to identify vulnerable versions usin
Discover the details of an arbitrary file upload vulnerability in a specific system and understand its potential risks of executing malicious codes. Learn about
Learn about the CVE-2017-9805 vulnerability in Apache Struts 2 and how to exploit it for remote code execution. Explore the attack process and experiment setup
This article describes a simple penetration test using the MS12-020 vulnerability on a Windows 2008 R2 system. Learn how to perform an exploit in Metasploit and