Login
Discover
Waves
Decks
Plus
Login
Signup
Topics
New
Trending
Hot
New
New
Trending
Hot
New
Payouts
Muted
Promoted
Global
Top communities
Create decentralized community
latest #offensive-security created topics on internet
cristi
cybersecurity
2018-05-27 12:35
Walkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 2]
In the previous demonstration, the first part of this walkthrough for DerpNStink vulnerable machine, we've managed to get inside the server by exploiting different services. Now, in this part, our purpose
$ 8.951
35
1
cristi
cybersecurity
2018-05-26 12:01
Practical Malware Analysis - Lecture 5 - [Prof. Sam Bowne]
Ok, so if you've been following my stuff, you know that I'm into Professor Sam Bowne's course from the Community College of San Francisco. So far, we've been going through some basics in this class, such
$ 15.139
42
1
cristi
cybersecurity
2018-05-23 11:20
Walkthrough for Shocker - A Vulnerable Machine [HackTheBox]
In this video I demonstrate how I get into and own a vulnerable virtual machine from hackthebox.eu. This box, as its name might suggest, is vulnerable to a shellshock exploit. For those who don't know,
$ 15.780
45
1
cristi
cybersecurity
2018-05-20 12:00
Pentesting Environment under Windows - [PentestBox]
Alexis Ahmed from Hackersploit youtube channel just made a insightful review on PentestBox, that was just recently released. So, the premise behind PentestBox is that it comes as a very good lightweight
$ 15.052
38
3
forkyishere
keys
2026-04-03 05:42
Promoted
How do you look when you use your private keys, in places you should not?
Because of the latest shenanigans of seeing people's accounts being obliterated by who knows how to deceive others, I thought I would throw some visual representations of how people are doing when they
$ 1.681
128
48
cristi
cybersecurity
2018-05-19 14:44
Beginning Exploit Development - [Prof. Sam Bowne]
Here's another one from my favorite professor in information security. So, in this hour long workshop, Professor Sam Bowne at CCSF, teaches folks at Toro.hack the basic of developing exploits - from a
$ 10.338
38
1
cristi
cybersecurity
2018-05-18 11:47
Walkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 1]
In this video I demonstrate a penetration testing assessment on a vulnerable machine from vulnhub.com. This machine is called DerpNStink and I enjoyed working on it a lot. In the first part of this
$ 19.191
40
2
cristi
cybersecurity
2018-05-15 11:04
Walkthrough for LAME - A Vulnerable Machine [HackTheBox]
In this video walkthrough I'm going to demonstrate another vulnerable machine from hackthebox.eu. For those of you who don't know, HackTheBox is a platform where cyber-security professionals can grow their
$ 14.652
37
3
cristi
cybersecurity
2018-04-20 13:20
JIS-CTF Walkthrough - Yet Another Cybersecurity Video
In this video I demonstrate how to get into a webserver through an unsanitized file upload functionality. First, we're dealing with a server for which the access to the administrator panel is easily achieved.
$ 19.427
38
2
sacra97
Holos&Lotus
2026-04-11 23:20
Promoted
Los patrones de la vida real [ESP/ENG]
Siempre dando una vuelta por la comunidad de @holos-lotus y sus temas de actualidad e interés, me detuve en un post de la amiga @issymarie2 con una comparación de nuestra vida con lo que le ocurre a Harry
$ 5.329
233
13
cristi
cybersecurity
2018-04-16 13:17
Privilege Escalation on Hackademic_RTB1 - A CTF Walkthrough
This is the second part for the walkthrough of the vulnerable machine HTB from vulnhub. In the first video I showed that to get inside this machine we exploited an SQL injection vulnerability. We obtained
$ 16.301
39
1
cristi
programming
2018-02-14 12:41
Disassembling Binaries with IDA - [A Reverse Engineering Tutorial]
In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able to extract a
$ 14.777
41
7
cristi
offensive-security
2018-02-10 15:23
A Collection of Vulnerable Machines for Penetration Testing and Offensive Security - [Vulnhub]
If you're into offensive security, one of the best places to safely practice your craft is Vulnhub, which is a collection of virtual machines which are vulnerable by design. What do I mean by that? Well,
$ 11.912
32
2