Web_finaljournal
Topic: Final Project [Instagram clone] We document the process of cloning Instagram, focusing on both backend and frontend development. This includes setting up a database, developing the backend ...
Topic: Final Project [Instagram clone] We document the process of cloning Instagram, focusing on both backend and frontend development. This includes setting up a database, developing the backend ...
Corridor Scanning.
Dig Dug The machine we are attacking is a DNS server. A DNS server simply assigns a domain, like google.com, to an IP. When we read the introduction, we see, that we have to make a special reque...
CyberHeroes First, we will check for website. And we are going to view thw page source. I found that a function called authenticate() is called on Button Click. And it has the function of ...
Valley Summary Enumeration website get hidden directory Use creds login ftp –> creds –> user.txt Login SSH, analyse binary file -> creds Change user –> check cronjob –> py...
Mr Robot CTF Task 1 : Connect to our network Task 2 : Hack the machine Q. What is key 1? Answer : 073403c8a58a1f80d943455fb30724b9 Q. What is key 2? Answer : 822c73956184f69499bede3eb...
CyberLens Scanning \ 80/tcp: Open HTTP (Apache httpd 2.4.57) — No CVE Found 135/tcp: Open Microsoft Windows RPC 139/tcp: Open Microsoft Windows netbios-ssn 445/tcp: Open Microsoft-DS ...
Basic Pentesting Q3. What is the name of the hidden directory on the web server(enter name without /)? Answer : development Q.5 What is the username? Answer : jan Q.6 What is the pas...
Dreaming This machine is about while the king of dreams was imprisoned, his home fell into ruins. So, we have to help him restore his kingdom. Scan We can see only two ports that are open, SSH ...
Bounty Hacker This scan will scan selected top 50 ports to save time and we can see that only 3 ports are open. Q. Who wrote the task list? we can see that lin has written the note. Answe...