The Ethicalhacking Guru
2,339 FOLLOWERS
Hacking tutorials and resources for beginners & advanced security professionals. 'The Ethicalhacking Guru' aims to provide professional-grade Cybersecurity training to everyone at affordable prices.
The Ethicalhacking Guru
2y ago
Becoming a Junior Penetration Tester is a dream come true for many who are passionate about cybersecurity. However, getting there isn’t always easy. One of the most crucial parts of the journey is the interview process. In this post, we’ll go through everything you need to know about how to ace your Junior Penetration Tester interview and land the job.
Steps To Ace Your Junior Penetration Tester Interview
Prepare for Technical Questions
The best way to prepare is hands-on experience, I recommend reading extensively, starting with Become An Ethical Hacker. As a Junior Penetration Tester, you ..read more
The Ethicalhacking Guru
3y ago
This is the HackMyVM Keys Walkthrough.
Web Enumeration
The webserver is hiding interesting files, it took a few different lists from seclists to find something good. What we do find is a file readme.php and that means we can investigate further.
gobuster dir -r -u http://10.0.50.79/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt -x php
The first page we run into says to READ the page, so I inspect the page source code and find some base64. The decode to see a hidden directory my_personal_wordlist.txt. We will end up decoding several things in this walkthrough. Put ..read more
The Ethicalhacking Guru
3y ago
Preparing for the OSCP exam means you need to know the basics, but you also need the experience. There is perhaps no better way to test how prepared you are for the exam than by hacking web apps. In this walkthrough we will cover one important skill to master, SQL injection without Metasploit. The M87 Vulnhub walkthrough will teach you how to do this so that you can feel confident in taking the exam no matter what is on the test.
Go to EHG Youtube
What Is SQL Injection?
SQL Injection is a code injection technique used by hackers to affect the database that is running behind the web application ..read more
The Ethicalhacking Guru
3y ago
This is the Hacker Kid Vulnhub walkthrough. Here’s what you will learn from this walkthrough. One thing you will learn is how to do binary analysis for Linux privilege escalation, but that is all I will give away. This is an excellent OSCP like box you can use to practice for the OSCP exam for free.
What is an OSCP-like box?
An OSCP-like box is one you might see on the Offensive Security OSCP exam. It is one that is more realistic in its intended exploitation than other boxes that rely on less practical exploit methodologies such as steganography, cracking complex hash sequences, etc. In a nut ..read more
The Ethicalhacking Guru
3y ago
This is the Billi Box 2 Vulnhub walkthrough. Here’s what you will learn from this walkthrough. One thing you will learn is how to do binary analysis for Linux privilege escalation, but that is all I will give away. This is an excellent OSCP like box you can use to practice for the OSCP exam for free.
What is an OSCP-like box?
An OSCP-like box is one that is more realistic in its intended exploitation than other boxes that rely on less practical exploit methodologies such as steganography, cracking complex hash sequences, etc. In a nutshell, it means that the box is something you could expect t ..read more
The Ethicalhacking Guru
3y ago
Exploiting vulnerable machines in a legal and safe environment is the only way to become an experienced ethical hacker. That is what this site is dedicated to, and so I present to you the HMS 1 vulnhub walkthrough, another of the vulnhub series here on the site. HMS 1 is a vulnerable Linux box created by Nivek. The HMS 1 vulnhub box is an excellent practice for Linux privilege escalation and a delightfully refreshing exercise in learning web app hacking.
Here is an overview in what you can expect to learn from completing the HMS 1 vulnhub walkthrough:
Manual SQL Injection and Exploitation
Usi ..read more
The Ethicalhacking Guru
3y ago
Penetration testing is one of the most emerging and promising fields in the IT sector. Penetration testers are ethical hackers. These “good” hackers are usually hired by system software owners or web-based application companies. The pen testers check the vulnerability of the private data of the system. So, ethical hackers are responsible for protecting data from the unethical hackers who may try to break into the system.
Do you want to become a penetration tester? Keep reading to learn about all the things you need to know.
What Does a Pen Tester do?
The main job of a pen tester is to identify ..read more
The Ethicalhacking Guru
3y ago
In this tutorial, you will learn how to write a reverse shell in Nim to bypass antivirus detection.
What Is Nim?
Nim is a scripting language similar to Python in syntax, but close to Golang in that it requires statically typed variables and it compiles its programs.
Why Use Nim?
However you feel about Python or Golang for that matter, Nim is worth looking at for offensive programming.
Very mature FFI (Foreign Functiong Interface)
Smaller compiled binaries than Golang. (KB’s versus 200+ KB)
Cross-compilation support with mingw-64, similar to Golang.
Can call the Windows API directly via the FF ..read more
The Ethicalhacking Guru
3y ago
Here at ethicalhackingguru.com the Ethical Hacking Guru is ready to spread the love. That is why this post is all about the new Pre Security Course from tryhackme.com which I have just finished. My review of this course will touch on the highlights as well as the disappointments.
As our About page will attest to, the mission of this site is to provide professional-grade cybersecurity training at affordable prices for the curious self-starters who want to start a new career, but aren’t sure how to. Our students refuse to be a victim of the overpriced “bootcamps” that do nothing but frustrate an ..read more