Step-by-step walkthroughs of legal and authorized penetration testing labs, focusing on methodology, enumeration, exploitation and privilege escalation.
Enumeration of SMB services, weak credentials exploitation and Linux privilege escalation.
Exploiting vulnerable SMB service and gaining root through misconfigured services.
Identifying SQL injection vulnerability, data extraction and mitigation discussion.
⚠️ All write-ups are based on legally accessible labs and authorized platforms. No real-world systems were harmed.