Skip to content

H4K – IT

The Ethical Way

  • Home
  • Ethical Hacking
  • CTF
  • CTF Platform
  • Archive
  • Press-release
  • News & Events
  • Resources
  • Contact Us
  • Ethical Hacking Writeups

Category: Ethical Hacking

July 1, 2022Ethical Hacking

Exploiting XML-RPC

XML-RPC EXPLOITATION I recently came across a bug bounty program that taught me how to exploit XML-RPC. XML-RPC enabled on a site can have several […]

Read More
May 5, 2022Ethical Hacking, Press-release

Cybersecurity Books

Mr Kharim Mchatta has recently published his 4 books which are intended to help individuals who are trying to get started in cybersecurity have the […]

Read More
March 10, 2022Ethical Hacking

Introduction to Docker

I recently decided to learn more about docker, I did my research on how to install docker on Kali Linux and Debian, how to install […]

Read More
February 24, 2022Ethical Hacking

Press-Enum (WordPress Hacking tool)

PRESS-ENUM When doing a penetration test not each engagement is going to be the same. Each penetration test would require some sort of re adjustment […]

Read More
September 15, 2021Ethical Hacking

Careers in Cybersecurity

CAREERS IN CYBERSECURITY A misconception that a lot of people have about this industry is that cybersecurity requires an individual to be a tech savvy […]

Read More
April 21, 2021Ethical Hacking

Access Control & Privilege Escalation

I recently came across a penetration test that taught me how to bypass the present access control and perform privilege escalation. The client’s website was very […]

Read More
March 1, 2021Ethical Hacking

Installing and Configuring Snort

I recently came across a project that taught me how to install and configure snort on a host. The main purpose of this was the […]

Read More
March 1, 2021Ethical Hacking

Cybersecurity Entry Path

The most common and frequently asked question to cybersecurity expert by newbies is how do I get started into cybersecurity? Where can I learn cybersecurity? […]

Read More
March 1, 2021Ethical Hacking

Installing and Configuring CTFd

Recently I came across a project that taught me how to install, setup and configure CTFd. The aim of this project was to have a […]

Read More
August 25, 2020Ethical Hacking

Reverse Engineering Malware

I recently came across a penetration test that taught me how to reverse engineer a malware. This malware caused Obfuscation for several days to the […]

Read More

Posts navigation

Older posts
Newer posts

News & Events

The Stranger in your inbox (AI fakes)

Please subscribe to get notified everytime i post new content
Loading

Cohort 3 Report

Latest Posts

  • From Cybercrime to Real Crime
  • Digital Inheritance
  • Why Now…… Introducing The New Game of Hacks
  • Supply Chain of Trust
  • The Illusion of Cloud Safety

Our Handles

Our Partners

Hackersploit
Alien-Within
Cyberspeak LC
AfricaHackon
Copyright © All rights reserved. Theme Creativ Musician by Creativ Themes