Learn different techniques to create custom wordlists from the content of a website and how to use John the Ripper or Hashcat to crack Windows or Linux passwords. Create tailored wordlists cewl www.example.com -m 6 -w example-cewl.txt Edit John the ripper config file:
In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker…
Passive reconnaissance is a critical step for bug bounties or penetration testing engagements, get ready!
Understand what are the most common security threats within the Ethereum Smart Contracts
To grab big bounties in Web3 you rather get inside the Matrix =D
After using nmap and unicornscan for a while, RustScan is probably the fastest to scan TCP and UDP ports, learn how to use it
When looking for new vulnerabilities, fuzzing, is a great technique to crash apps with unexpected data, learn how to do it.
Learn several techniques to scan hosts, bypass firewalls and scan the whole IPv4 universe.
See all

Learn Pentesting like a Pro