THM: Researching — Tools and Commands
You'll explore the basics of researching vulnerabilities, finding relevant CVEs, and learning about Linux commands useful for cybersecurity tasks.
1. Burp Suite Mode for Manual Requests
2. Windows Password Hash Format
3. Automated Tasks in Linux
4. Shorthand Number Base
5. Unix Password Hash Format
Common Vulnerabilities and Exposures (CVE) Research
1. WPForms 2020 XSS Vulnerability
2. Apache Tomcat Privilege Escalation (2016)
3. First VLC Media Player CVE
4. 2020 Buffer Overflow in Sudo Program
Common Linux Commands for Pentesting
1. Copying Directories with SCP
2. Viewing Disk Partitions with fdisk
fdisk3. Making Backups with nano
nano4. Listening on a Port with Netcat
Last updated