So-Simple Walk-through

Network scanning and target discovery :-

Target Scanning with nmap :-

HTTP Enumeration and Exploitation:-

--

--

--

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

CloudWatch log filter-pattern for MySQL Slow queries logs to processed by Lambda Function.

How to get Free ETH and BTC HashRate Commision by inviting friends?

How to get your PR reviewed faster

Building Scaleable CSS

Object-Oriented Programming in a NutShell

Creating a Secure Django RestFUL API

5 Git Commands To Get You Out of Trouble

Why Use a Database When You Can Use the Web Storage API?

cables connted to some hard disk drive.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sarthak joshi

Sarthak joshi

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

More from Medium

KYVE Incentivised Testnet MISSION korellia part2

OpenLuck Integrates LayerZero Omnichain Interoperability Protocol to Help Power Cross-Chain NFT…

3D Starryverse Feedback Bounty

Torment 3D Animation