-
OWASP Top 10 2025: IAAA Failures | TryHackMe Write-upWalkthrough for OWASP Top 10 2025: IAAA Failures TryHackme room. Learn about A01, A07, and A09 in how they related to failures in the applied IAAA model
3 min -
File Inclusion | TryHackMe Write-upComplete walkthrough for the File Inclusion TryHackMe room. This room introduces file inclusion vulnerabilities, including LFI, RFI, and directory traversal.
7 min -
TakeOver | TryHackMe Write-upComplete walkthrough for TakeOver TryHackme room. This challenge revolves around subdomain enumeration.
2 min -
IDOR | TryHackMe Write-upWalkthrough for IDOR TryHackme room. Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.
3 min -
Authentication Bypass | TryHackMe Write-upWalkthrough for Authentication Bypass TryHackMe room. Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas.
4 min -
Subdomain Enumeration | TryHackMe Write-upComplete walkthrough for Subdomain Enumeration TryHackme room. Learn the various ways of discovering subdomains to expand your attack surface of a target.
3 min -
Content Discovery | TryHackMe Write-UpTryHackMe write-up for “Walking An Application.” Learn how to use browser developer tools to manually discover hidden flags and potential vulnerabilities.
5 min -
Walking An Application | TryHackMe Write-UpHands-on walkthrough of Walking An Application on TryHackMe, exploring source code, Inspector, Debugger, and Network tools to uncover hidden flags.
5 min