User avatar
TxLast
[0x6]
Rank
230554
Badges
7
Streak
0
Completed rooms
33
Offensive Security Intro

Offensive Security Intro

Hack your first website (legally in a safe environment) and experience an ethical hacker's job.

easy

Free Walkthrough
Pentesting Fundamentals

Pentesting Fundamentals

Learn the important ethics and methodologies behind every pentest.

easy

Free Walkthrough
Defensive Security Intro

Defensive Security Intro

Introducing defensive security and related topics, such as Threat Intelligence, SOC, DFIR, Malware Analysis, and SIEM.

easy

Free Walkthrough
Careers in Cyber

Careers in Cyber

Learn about the different careers in cyber security.

info

Free Walkthrough
Principles of Security

Principles of Security

Learn the principles of information security that secures data and protects systems from abuse

info

Premium Walkthrough
Walking An Application

Walking An Application

Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser, no tools or scripts.

easy

Premium Walkthrough
Content Discovery

Content Discovery

Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.

easy

Premium Walkthrough
Subdomain Enumeration

Subdomain Enumeration

Learn the various ways of discovering subdomains to expand your attack surface of a target.

easy

Premium Walkthrough
Authentication Bypass

Authentication Bypass

Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas.

easy

Premium Walkthrough
IDOR

IDOR

Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.

easy

Premium Walkthrough
File Inclusion

File Inclusion

This room introduces file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal.

medium

Premium Walkthrough
Burp Suite: The Basics

Burp Suite: The Basics

An introduction to using Burp Suite for web application pentesting.

info

Premium Walkthrough
Intro to SSRF

Intro to SSRF

Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities, allowing you to access internal server resources.

easy

Premium Walkthrough
Burp Suite: Repeater

Burp Suite: Repeater

Learn how to use Repeater to duplicate requests in Burp Suite.

info

Free Walkthrough
Burp Suite: Intruder

Burp Suite: Intruder

Learn how to use Intruder to automate requests in Burp Suite.

medium

Premium Walkthrough
Burp Suite: Other Modules

Burp Suite: Other Modules

Take a dive into some of Burp Suite's lesser-known modules.

easy

Premium Walkthrough

1 of 3 available pages

We use cookies to ensure you get the best user experience. For more information contact us.

Read more