This is Thumbnail

TryHackMe Smag Grotto Walkthrough

NMAP Scan we can see there are 2 services on port 22 and port 80. we will check out port 80. upon directory enumeration, we found an interesting directory on the website lets explore it, here we can see an attachment with .pcap extension, let’s download it and open it with wireshark. as you can see in the image we upon examining the POST request, we found out the credentials, now we are going to try them in on the HOST website i.e development.smag.thm . ...

January 30, 2026 · 2 min · 359 words
This is Thumbnail

TryHackMe OWASP Application Design Flaws Walkthrough

These Design Flaws Contain: 1. AS02: Security Misconfigurations 2. AS03: Software Supply Chain Failures 3. AS04: Cryptographic Failures 4. AS06: Insecure Design AS02: Security Misconfigurations Happens when system, servers or applications are deployed with unsafe defaults, incomplete settings, or exposed services. These are not code bugs but mistakes in how the environment, software or network is set up. They create easy entry points for attackers. even a small misconfig can expose sensitive data, enable priv esc, of give foothold to the attackers. Modern applications rely on complex stacks, cloud services, and third-party APIs. A single exposed admin panel, an open storage bucket, or misconfigured permissions can compromise the entire system. ...

January 9, 2026 · 6 min · 1227 words
This is Thumbnail

TryHackMe OWASP Insecure Data Handling Walkthrough

This room will introduce you to 3 elements of the OWASP Top 10 list (2025). In this room, you will learn about the elements relating to application behaviour and user input. We will cover these vulnerabilities briefly, how to prevent them, and finally, you will practice exploiting these vulnerabilities: A04: Cryptographic Failures A05: Injection A08: Software or Data Integrity Failures How to Prevent Cryptographic Failures Preventing cryptographic failures starts with choosing strong, modern algorithms and implementing them properly. Sensitive information such as passwords should be hashed using robust, slow hashing functions like bcrypt, scrypt, or Argon2. When encrypting data, avoid creating your own algorithms; instead, rely on trusted, industry-standard libraries. ...

January 9, 2026 · 3 min · 491 words
This is Ejpt Cert pic

How I Cleared the eJPT: Honest Experience and Learnings

Exam Duration and Difficulty I recently cleared the eJPT (eLearnSecurity Junior Penetration Tester) exam, and overall, it was a very solid learning experience. I completed the exam in about 35 hours, including sleep. While it wasn’t extremely hard to pass, I wouldn’t call it easy either. I’d place it somewhere between intermediate and hard, especially if you’re completely new to penetration testing. More About Penetration Testing Than Web Apps One thing that surprised me was that the exam is not very focused on web application penetration testing. There is some web-related work, but most of the exam feels more like real-world network and system-level penetration testing. You spend more time enumerating services, exploiting misconfigurations, moving through systems, and understanding how different parts of the network connect, which I personally enjoyed a lot. ...

November 12, 2025 · 2 min · 426 words