• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      prodigiousMind

      • Home
      • Author prodigiousMind
      Showing 1-6 of 348 results
      prodigiousMind prodigiousMind

      Linux Privilege Escalation Using SUID Pkexec Binary

      • Posted by prodigiousMind
      January 5, 2022

      Hi, In this video I have covered the following topics: What is pkexec How pkexec works Demonstration of Privilege Escalation using SUID pkexec STEPS to Achieve Root Access

      Read More
      prodigiousMind prodigiousMind

      Log4Shell Vulnerability – Exploitation & Explanation

      • Posted by prodigiousMind
      December 25, 2021

      Hey guys, In this video, I have covered the following topics: What is log4j Log4j Vulnerability (CVE: 2021-44228) Mitigation or Fix What is LDAP (Lightweight Directory Access Protocol) What is JNDI (Java Naming & Directory Interface) How Exploit or Payload …

      Read More
      prodigiousMind prodigiousMind

      ARP Poisoning Attack Demonstration

      • Posted by prodigiousMind
      December 23, 2021

      In this video I have covered the following topics Address Resolution Protocol (ARP) IP Address & MAC Address ARP Request & ARP Response ARP Cache ARP Spoofing/Poisoning Demonstration of ARP Spoofing/Poisoning Attack Why & How ARP Spoofing Works What Can …

      Read More
      prodigiousMind prodigiousMind

      Server Side Template Injection Explanation & Exploitation

      • Posted by prodigiousMind
      December 9, 2021

      In this video I have explained the following topics: Server Side Template Injection Why SSTI arises in web applications How SSTI is different from XSS Demonstration of the Attack (SSTI) Detection of SSTI Detection of SSTI by automation in Bash …

      Read More
      prodigiousMind prodigiousMind

      Ways to Exploit Account TakeOver Vulnerabilities

      • Posted by prodigiousMind
      November 23, 2021

      In this video I have explained the following topics: What is authentication? What is authorization? Account TakeOver Vulnerability Brute-Force Attack & it’s prevention Session-Hijacking by XSS & it’s prevention Session Side-Jacking & it’s prevention Account TakeOver by cross-site request forgery …

      Read More
      prodigiousMind prodigiousMind

      Intro to Directory Traversal Attacks

      • Posted by prodigiousMind
      November 9, 2021

      Hey guys, In this video, I will explain the following topics: What is path traversal attack in web application security How it can be exploited? What is local file inclusion What is relative and absolute path with example Demonstration of …

      Read More
      • 1
      • 2
      • 3
      • >

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2021 zSecurity Ltd. All rights reserved.

      • Privacy
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Learn more Hacking!

      While waiting for the download, why not follow us on media? We regularly post hacking tutorials and articles


      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance