ftp Complete Tutorial in 10 Examples – Must-know Command for CTF
Learn FTP in 10 simple examples, from connecting to uploading and downloading files. See how hackers steal FTP password and what are the secure alternatives
Learn FTP in 10 simple examples, from connecting to uploading and downloading files. See how hackers steal FTP password and what are the secure alternatives
Complete scp tutorial: transfer files and folders securely over SSH. All the main options of scp are covered and pre-made scp commands are provided.
Complete curl tutorial: send HTTP GET and POST requests, interact with JSON API, send files, use custom HTTP headers, download files, etc.
Practical netcat (nc) guide for Linux: reverse shells, TCP/UDP connections, port scanning, file transfers, and key options for CTF and Pentesting.
Master nmap with thist tutorial, from basic host discovery, port and service scanning to more advanced techniques like firewall evasion
Full tutorial to brute-force network services with hydra, including SSH, FTP, HTTP, NFS, SMB, etc. Hydra is useful during CTF or pentesting to brute-force login.
Complete walkthrough of Lookup room on TryHackMe: form brute-forcing, elFinder CVE and 2 Linux misconfigurations lead us to the root flag.
Full walkthrough of the TryHackMe Basic Pentesting room: web enumeration, SMB usernames, SSH access and SSH private key brute-force.
Full walkthrough of RootMe: reconnaissance, getting a PHP shell then a reverse shell, and elevating our privileges through a SUID misconfiguration
Full walkthrough of the Corridor Challenge on TryHackMe. We find the flag by exploiting IDOR through a MD5 id in the URL of the web app.