Hello everyone, In this video, I’ll be talking about kerberos authentication and how it works, then I’ll talk about kerberoasting attack. The practical demonstration of the attack will be done in the next video! Hope you enjoy it, Please feel …
Hey everyone, Here is the Official zSecurity Merch CTF Walkthrough. I hope you guys enjoy it and if you do, please smash the like button and the subscribe button if you haven’t already! You can access this lab, previous labs …
Attackers constantly leverage various security and privacy issues to breach popular messengers. Can these apps be trusted? Calling instant messengers top applications is like saying that the most popular liquid is water. The list of most downloaded apps includes Facebook …
Hello everyone, in todays video I will be introducing you to Regular Expression Denial of Service vulnerability.
Hey guys, In this video, I will be showing you how to view the source code of any android application. Resources: Dex2jar JD-GUI
This video teaches you how to discover and exploit SSTI or Server Side Template Injection vulnerabilities. To demonstrate this vulnerability, Dimitris is going to hack and root the doctor machine from hackthebox.