This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don't need to be an expe.....
Using THC Hydra To Brute Force Login Forms
THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against dif.....
Linux Privilege Escalation: Three Easy Ways to Get a Root Shell
Once you've gained access to a Linux system, the next logical step is to perform privilege escalation.....
Using John The Ripper To Crack Password Hashes
Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracke.....
Using Gobuster to Find Hidden Web Content
Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting.
<!-- /wp:.....