
TryHackMe - OWASP Top 10 2021 Room Walkthrough
Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.

Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.

Learn about digital forensics and related processes and experiment with a practical example.

Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas!

Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials.

Enumerating and Exploiting More Common Network Services & Misconfigurations

Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.

An introduction to the main components of the Metasploit Framework.

Learn about active recon, web app attacks and privilege escalation.

An introduction to infrastructure as code.

In part 3 of the Windows Fundamentals module, learn about the built-in Microsoft tools that help keep the device secure, such as Windows Updates, Windows Security, BitLocker, and more...