| CSEC_Cybersecurity
🚀 Week 2: Chaining Web Vulnerabilities by Ghackz🚀
This week, we explored Arbitrary Code Execution and Path Traversal vulnerabilities. 🕵️♂️🔓
🔍 Arbitrary Code Execution: Learned how attackers execute malicious commands on target systems.
🌐 Path Traversal: Discovered how attackers manipulate file paths to access restricted files.
💡 Our session, presented by Girum Senay aka Ghackz, included live demos and real-world examples, equipping everyone to tackle these threats.
🏆 A special shout-out to Nahomd for achieving First Blood by getting a reverse shell! 🩸
Stay tuned for more cybersecurity insights! 💻🔥
#CSEC_Cybersecurity #ArbitraryCodeExecution #PathTraversal #FirstBlood #HTB
🚀 Week 2: Chaining Web Vulnerabilities by Ghackz🚀
This week, we explored Arbitrary Code Execution and Path Traversal vulnerabilities. 🕵️♂️🔓
🔍 Arbitrary Code Execution: Learned how attackers execute malicious commands on target systems.
🌐 Path Traversal: Discovered how attackers manipulate file paths to access restricted files.
💡 Our session, presented by Girum Senay aka Ghackz, included live demos and real-world examples, equipping everyone to tackle these threats.
🏆 A special shout-out to Nahomd for achieving First Blood by getting a reverse shell! 🩸
Stay tuned for more cybersecurity insights! 💻🔥
#CSEC_Cybersecurity #ArbitraryCodeExecution #PathTraversal #FirstBlood #HTB