VulnNet: dotjar TryHackMe Walkthrough

python3 ajpShooter.py http://10.10.228.133:8080/ 8009 /WEB-INF/web.xml read

Penetration Tester/Analytical Chemist who Loves Cybersecurity. GitHub(https://github.com/musyoka101), ExploitDB(https://www.exploit-db.com/?author=10517)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Your future of cybersecurity — the rules and algorithms of AI/ML

Another Day, Another Reentrancy Attack

Data Privacy Law in Virginia Enhances Consumer Protections

Data Privacy Fraud

What are the best 4 VPN services you should use in 2021?

What is domain squatting and what can you do about it?

Nigerian ‘Entrepreneur’ Washed $11m from Unatrack Holdings:

Agent Sudo THM (Detailed Writeup)

LATOKEN Review: Say NO to Crypto Scams — Enjoy Safe Trading

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Musyoka Ian

Musyoka Ian

Penetration Tester/Analytical Chemist who Loves Cybersecurity. GitHub(https://github.com/musyoka101), ExploitDB(https://www.exploit-db.com/?author=10517)

More from Medium

Insecure Deserialization — FAQ

Getting Your Hands Dirty: Exploiting Buffer Overflow Vulnerability In C

Google Dork Series — Part 4 !!!

TryHackMe: Nmap room | FurtherNmap

output of the command “nmap -h | grep ‘SYN’”