Web-Pentesting

Mutillidae ||

Getting Started with OWASP Mutillidae II A beginner-friendly guide to one of the most powerful vulnerable web apps for practicing ethical hacking What Is OWASP Mutillidae II? OWASP Mutillidae II, also known as Matilda Day 2, is a deliberately vulnerable web application designed to help you practice: It’s written in PHP, runs on Apache, and […]

Mutillidae || Read More »

LAMP Stack

Understanding the LAMP Stack and How Web Servers Work Together From File to Function: A Beginner Pentester’s Guide to Hosting Web Apps When I first started experimenting with vulnerable web applications like OWASP Mutillidae II (Matilda Day 2), I didn’t just want to get it running — I wanted to understand what was happening under

LAMP Stack Read More »

Data Heists

Exfiltrating Credentials and Sensitive Data from Web Applications Getting inside the castle is one thing. Looting it without setting off alarms? That’s where real skill comes in. Once you’ve compromised a web application, the next step is clear: find and extract sensitive data—usernames, passwords, tokens, configuration files, database records, and anything else the devs forgot

Data Heists Read More »

Parameters

🔹 1. Query String Parameters (GET) Used in URLs, sent via the query string after a ?. Example: 🔹 2. Form Parameters (POST) Sent in the request body, often in login or contact forms. Example: 🔹 3. URL Path Parameters Some apps use REST-style URLs where the parameter is embedded in the path. Example: 🔹

Parameters Read More »

Scroll to Top