Skip to content

H4K – IT

The Ethical Way

  • Home
  • Ethical Hacking
  • CTF
  • CTF Platform
  • Archive
  • Press-release
  • News & Events
  • Resources
  • Contact Us
  • Ethical Hacking Writeups

Category: Ethical Hacking

August 9, 2020Ethical Hacking

Migrating website from one server to another

I came across a project that taught me how to migrate a wordpress website from one server to another, after doing research I managed to […]

Read More
August 9, 2020Ethical Hacking

How to create a sub-domain

I recently came across a project that taught me how to create a sub-domain and install wordpress on the sub-domain. It was a great experience […]

Read More
August 9, 2020Ethical Hacking

File Sharing: Ngrok and Apache

I recently faced a problem where I was trying to share files with my friends but I couldn’t do so cause 1. my Google drive […]

Read More
May 15, 2020Ethical Hacking

SQL Injection and Command Injection Vulnerability

I recently cam across a penetration test that taught me how to perform SQL Injection and Command execution respectively. The site’s login page wasn’t filtering […]

Read More
April 16, 2020Ethical Hacking

Password Spraying

I recently came across a network penetration test that taught me how to perform password spraying. As usual I began my reconnaissance with nmap on […]

Read More
April 16, 2020Ethical Hacking

Live Acquisition

I came across a Forensic Consultancy job that taught me how to perform a live acquisition with Kali Linux using a forensic tool called dd on […]

Read More
April 16, 2020Ethical Hacking

Installing BloodHound

I recently came across a network penetration test that taught me how to install bloodhound which I was going to use to enumerate kerberos. Kerberos […]

Read More
February 29, 2020Ethical Hacking

How to Disable Login Hints In WordPress

Some Web Applications have a tendency of revealing information which they are not supposed to reveal, this could be s a result of either the […]

Read More
February 29, 2020Ethical Hacking

Installing Squid Proxy Server on your VPS and Configure The Proxy on The Client Side

I recently decided to set up a proxy server due to the fact that our web browsers tend to leak a lot of our information […]

Read More
January 20, 2020Ethical Hacking

Custom Http Error Codes

This is the second part of the first Series which was installing Apache, MySQL, PHP and WordPress. In this series, we are going to talk […]

Read More

Posts navigation

Older posts
Newer posts

News & Events

The Stranger in your inbox (AI fakes)

Please subscribe to get notified everytime i post new content
Loading

Cohort 3 Report

Latest Posts

  • From Cybercrime to Real Crime
  • Digital Inheritance
  • Why Now…… Introducing The New Game of Hacks
  • Supply Chain of Trust
  • The Illusion of Cloud Safety

Our Handles

Our Partners

Hackersploit
Alien-Within
Cyberspeak LC
AfricaHackon
Copyright © All rights reserved. Theme Creativ Musician by Creativ Themes