InDark Roast SecuritybyKatlyn GalloLog4J Vulnerability ExplainedThe Log4j vulnerability exposed hundreds of thousands of systems to attack in December 2021. Now, nearly a year later, here’s where we are.Oct 4, 2022Oct 4, 2022
InDark Roast SecuritybyKatlyn GalloLight Roast 115: What is Hashing?An introduction to hashing and some common use cases in technology.Aug 22, 2022Aug 22, 2022
InDark Roast SecuritybyKatlyn GalloDark Side 126: Using Metasploit to Exploit SMBAn introduction to using Metasploit to exploit a Windows machine with an SMB vulnerability (MS17–010).Feb 24, 20222Feb 24, 20222
InDark Roast SecuritybyKatlyn GalloDark Side 126: Intro to Log4jDiscovering & POC’ing the vulnerability that has taken the InfoSec world by storm.Dec 30, 2021Dec 30, 2021
InDark Roast SecuritybyKatlyn GalloDark Side 124: Intro to LFI VulnerabilitiesWhat is Local File Inclusion (LFI) and how can it be exploited?Dec 7, 2021Dec 7, 2021
InDark Roast SecuritybyKatlyn GalloDark Side 122: Intro to Shells & NetcatAn intro to shells, their use cases, and Netcat, a networking tool every pentester should know.Oct 21, 2021Oct 21, 2021
InDark Roast SecuritybyKatlyn GalloDark Side 121: Exploiting File Upload Vulnerabilities — Part ThreeEnumerating and bypassing server-side filtering for file uploads.Oct 15, 2021Oct 15, 2021
InDark Roast SecuritybyKatlyn GalloDark Side 117: Using Sqlmap for Database TakeoverAn overview of using Sqlmap to exploit SQL injection vulnerabilities.Aug 7, 2021Aug 7, 2021
InDark Roast SecuritybyKatlyn GalloDark Side 118: Exploiting File Upload Vulnerabilities — Part OneA deeper look into how file uploads can put website security at risk.Aug 18, 20211Aug 18, 20211
InDark Roast SecuritybyKatlyn GalloDark Side 119: Exploiting File Upload Vulnerabilities — Part TwoClient vs. Server-Side Filtering & Common BypassesSep 10, 2021Sep 10, 2021
InDark Roast SecuritybyKatlyn GalloDark Side 101: My First CTFI officially captured my first flag! One that can probably can be done with ease by seasoned hackers but super exciting for a beginner…Nov 9, 2020Nov 9, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 102: Google DorkingGeeking out over “Google Dorking”.Nov 10, 2020Nov 10, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 103: Learning LinuxFirst Impression: Intimidating!!Nov 17, 2020Nov 17, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 104: Learning Linux Part 2Linux Challenges Room completed! If you haven’t read Part One yet, check that one out as well. It’s a precursor to this one where I wrote…Nov 21, 2020Nov 21, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 105: Intro to Privilege EscalationI’ve accomplished my first few privilege escalations!Dec 1, 2020Dec 1, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 106: Web ExploitationAs mentioned in a previous Dark Side post, I’m participating in TryHackMe’s Cyber Advent 2. This is a 25 day long hacking event where new…Dec 5, 2020Dec 5, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 107: Exploiting FTPFTP…Security Teams’ Worst Nightmare. Well One of Many.Dec 10, 20201Dec 10, 20201
InDark Roast SecuritybyKatlyn GalloDark Side 108: SSRF — Server-Side Request ForgeryWe’re on Day 19 of TryHackMe’s Cyber Advent 2 event!Dec 23, 2020Dec 23, 2020
InDark Roast SecuritybyKatlyn GalloDark Side 109: Intro to PowerShellUh oh, Elf McEager is locked out of one of his servers, ElfStation1!Dec 28, 20201Dec 28, 20201
InDark Roast SecuritybyKatlyn GalloDark Side 112: Cybersecurity Lab SetupNot sure where to start for a practice environment? Here’s a good place!Feb 3, 20211Feb 3, 20211