| CSEC_Cybersecurity
๐ Week 2: Chaining Web Vulnerabilities by Ghackz๐
This week, we explored Arbitrary Code Execution and Path Traversal vulnerabilities. ๐ต๏ธโโ๏ธ๐
๐ Arbitrary Code Execution: Learned how attackers execute malicious commands on target systems.
๐ Path Traversal: Discovered how attackers manipulate file paths to access restricted files.
๐ก Our session, presented by Girum Senay aka Ghackz, included live demos and real-world examples, equipping everyone to tackle these threats.
๐ A special shout-out to Nahomd for achieving First Blood by getting a reverse shell! ๐ฉธ
Stay tuned for more cybersecurity insights! ๐ป๐ฅ
#CSEC_Cybersecurity #ArbitraryCodeExecution #PathTraversal #FirstBlood #HTB
๐ Week 2: Chaining Web Vulnerabilities by Ghackz๐
This week, we explored Arbitrary Code Execution and Path Traversal vulnerabilities. ๐ต๏ธโโ๏ธ๐
๐ Arbitrary Code Execution: Learned how attackers execute malicious commands on target systems.
๐ Path Traversal: Discovered how attackers manipulate file paths to access restricted files.
๐ก Our session, presented by Girum Senay aka Ghackz, included live demos and real-world examples, equipping everyone to tackle these threats.
๐ A special shout-out to Nahomd for achieving First Blood by getting a reverse shell! ๐ฉธ
Stay tuned for more cybersecurity insights! ๐ป๐ฅ
#CSEC_Cybersecurity #ArbitraryCodeExecution #PathTraversal #FirstBlood #HTB